Reduce your software costs by 18% overnight
Cloak and Dagger File Encryption Software

Cloak and Dagger File Encryption Software Alternatives & Competitors

(3)5.0 out of 5

Looking for alternatives to Cloak and Dagger File Encryption Software? Tons of people want Encryption Software. What's difficult is finding out whether or not the software you choose is right for you. ESET PROTECT Advanced, ServiceNow Now Platform, Microsoft BitLocker, and VeraCrypt are the most popular alternatives and competitors to Cloak and Dagger File Encryption Software.

Top Alternatives to Cloak and Dagger File Encryption Software

  • ESET PROTECT Advanced
  • ServiceNow Now Platform
  • Microsoft BitLocker
  • VeraCrypt
  • Progress MOVEit

Top 20 Alternatives & Competitors to Cloak and Dagger File Encryption Software

    #1
    #1
  1. ESET PROTECT Advanced

    (403)4.6 out of 5
    Optimized for quick response

    Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.

    Categories in common with Cloak and Dagger File Encryption Software:
  2. Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.

    Categories in common with Cloak and Dagger File Encryption Software:

    Б
    We have use last 5 years in Eset endpoint security software on my company. Very fast and high speed detection engine for my company daily usage for eset endpoint security
    #2
    #2
  3. ServiceNow Now Platform

    (248)4.0 out of 5

    The Now Platform delivers a System of Action for the enterprise. Using a single data model, it makes it easy to create contextual workflows and automate business processes. The platform's Intelligent Automation Engine combines machine learning with automated actions to dramatically reduce costs and speed time‑to‑resolution.

    Categories in common with Cloak and Dagger File Encryption Software:
  4. The Now Platform delivers a System of Action for the enterprise. Using a single data model, it makes it easy to create contextual workflows and automate business processes. The platform's Intelligent Automation Engine combines machine learning with automated actions to dramatically reduce costs and speed time‑to‑resolution.

    Categories in common with Cloak and Dagger File Encryption Software:

    PS
    There are several points that I like about this tool. 1)Price:- It comes with much economical price. So almost all organizations can deploy & make use of it. 2)It is User Friendly, Ease in Use,...Read more
    18%   of software applications aren't well liked by teams using them.
    Find out how your team feels about your stack with G2 Pulse Surveys.
    Learn More
    #3
    #3
  5. Microsoft BitLocker

    (83)4.1 out of 5

    BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.

    Categories in common with Cloak and Dagger File Encryption Software:
  6. BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.

    Categories in common with Cloak and Dagger File Encryption Software:

    Anees Hussein B.
    AB
    I live the simplicity of the app with is made to accommodate everyone's need
    #4
    #4
  7. VeraCrypt

    (47)4.5 out of 5

    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    Categories in common with Cloak and Dagger File Encryption Software:
  8. VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    Categories in common with Cloak and Dagger File Encryption Software:

    Howard N.
    HN
    The encryption of our files and personal details is important in order to secure them. I still insert my files on the drive of Dropbox or Google, some of which can be blown up by state actors or...Read more
    #5
    #5
  9. Progress MOVEit

    (46)4.3 out of 5
    Optimized for quick response

    Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit from Ipswitch File Transfer to simplify file transfer tasks, save time, and improve communications.

    Categories in common with Cloak and Dagger File Encryption Software:
  10. Exchanging files over the Internet shouldn’t be complicated. That’s why more than 40 million users from around the world rely on MOVEit from Ipswitch File Transfer to simplify file transfer tasks, save time, and improve communications.

    Categories in common with Cloak and Dagger File Encryption Software:

    LM
    Pretty intuitive product to set up. Needed a little guidance to get PGP setup
    #6
    #6
  11. FileVault

    (35)4.3 out of 5

    FileVault is a disk encryption program in Mac OS X 10.3 and later.

    Categories in common with Cloak and Dagger File Encryption Software:
  12. FileVault is a disk encryption program in Mac OS X 10.3 and later.

    Categories in common with Cloak and Dagger File Encryption Software:

    AA
    I like how it offers an extra layer of security, it's built-in, included with the computer, and free. When compared to the paid alternatives, there's really no reason to complain, so long as Apple...Read more
    #7
    #7
  13. Tor

    (34)4.4 out of 5

    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Categories in common with Cloak and Dagger File Encryption Software:
  14. A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Categories in common with Cloak and Dagger File Encryption Software:

    Madusanka B.
    MB
    The Tor is a best secured browse for anonymous browsing.Its installation process is very easy and no need specified requirement to run this browser. And also it has user friendly interface which...Read more
    #8
    #8
  15. AWS Certificate Manager

    (32)4.4 out of 5

    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.

    Categories in common with Cloak and Dagger File Encryption Software:
  16. AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.

    Categories in common with Cloak and Dagger File Encryption Software:

    MK
    This Certificate can be used with any Rout53 DNS provider to host a secure HTTPS website, The setup and validation process are simple, AWS gives two type of validations, email validation and DNS...Read more
    #9
    #9
  17. HashiCorp Vault

    (30)4.3 out of 5

    HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach

    Categories in common with Cloak and Dagger File Encryption Software:
  18. HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach

    Categories in common with Cloak and Dagger File Encryption Software:

    AI
    Rich set of options to control access (policies, groups), rich set of authorizations for users (e.g. oidc, leap) and for apps (kubernetes, approle). Versioned KV storage for secrets. Dynamic...Read more
    #10
    #10
  19. Endpoint Encryption

    (28)4.2 out of 5

    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.

    Categories in common with Cloak and Dagger File Encryption Software:
  20. Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.

    Categories in common with Cloak and Dagger File Encryption Software:

    Daniel W.
    DW
    Trend Micro Endpoint Encryption has all the necessary technology for complete disk encryption, in addition to being able to encrypt any electronic device, it is remarkable that it is possible to...Read more
    #11
    #11
  21. Sophos SafeGuard Encryption

    (26)3.8 out of 5

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Categories in common with Cloak and Dagger File Encryption Software:
  22. Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Categories in common with Cloak and Dagger File Encryption Software:

    AI
    Easy to set up. Works as a management system to Apple's Filevault 2.
    #12
    #12
  23. Symantec Endpoint Encryption

    (25)3.6 out of 5

    Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

    Categories in common with Cloak and Dagger File Encryption Software:
  24. Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

    Categories in common with Cloak and Dagger File Encryption Software:

    AH
    The fact that I have moved to another product.
    #13
    #13
  25. Tresorit

    (20)4.4 out of 5

    Tresorit is a secure cloud-based file synchronization software that store encrypted data in order to make it shareable and accessible from everywhere.

    Categories in common with Cloak and Dagger File Encryption Software:
  26. Tresorit is a secure cloud-based file synchronization software that store encrypted data in order to make it shareable and accessible from everywhere.

    Categories in common with Cloak and Dagger File Encryption Software:

    DC
    This system for us is pleasant since it allows us to encrypt and keep our files safe, attaching a backup in each of our documents, Tresorit although it is a little known cloud system is incredible...Read more
    #14
    #14
  27. Boxcryptor

    (19)4.6 out of 5

    Boxcryptor is a end-to-end encryption for Dropbox & Co.

    Categories in common with Cloak and Dagger File Encryption Software:
  28. Boxcryptor is a end-to-end encryption for Dropbox & Co.

    Categories in common with Cloak and Dagger File Encryption Software:

    Kelly C.
    KC
    Boxcryptor fascinates me because it allows me to safely use cloud storage services without sacrificing comfort, it works perfectly on computers, mobiles and tablets, and the main operating systems;...Read more
    #15
    #15
  29. Letsencrypt

    (18)4.8 out of 5

    Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

    Categories in common with Cloak and Dagger File Encryption Software:
  30. Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

    Categories in common with Cloak and Dagger File Encryption Software:

    Maria R.
    MR
    Having an SLL certificate is essential if you want to qualify for google rankings. Letsencrypt is free and easy to set-up.
    #16
    #16
  31. TokenEx

    (17)4.6 out of 5

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.

    Categories in common with Cloak and Dagger File Encryption Software:
  32. TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.

    Categories in common with Cloak and Dagger File Encryption Software:

    PC
    We had and have a great experience with TokenEx! The first initial contact and communication was clear and very conductive. We are pleased with the service and the cost. Most of all we have a peace...Read more
    #17
    #17
  33. Keybase

    (16)3.8 out of 5

    Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.

    Categories in common with Cloak and Dagger File Encryption Software:
  34. Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.

    Categories in common with Cloak and Dagger File Encryption Software:

    AP
    Keybase is not a single app, it is a suite of multiple apps and these apps are very likeable: Chat application: If you are a slack user and love the of inter company communication, Keybase runs...Read more
    #18
    #18
  35. Folder Lock

    (14)4.5 out of 5

    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Categories in common with Cloak and Dagger File Encryption Software:
  36. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Categories in common with Cloak and Dagger File Encryption Software:

    Maria B.
    MB
    The capacities to protect the specific files are very varied and can even protect removable disks and external memory units. Encryption is very strong under the protection protocols it uses. The...Read more
    #19
    #19
  37. Dell Data Protection

    (15)4.4 out of 5

    Dell Data Protection offers comprehensive solutions with strong manageability to secure data.

    Categories in common with Cloak and Dagger File Encryption Software:
  38. Dell Data Protection offers comprehensive solutions with strong manageability to secure data.

    Categories in common with Cloak and Dagger File Encryption Software:

    RU
    The hardened security for my firm devices, both Software and M.2 Hardware encryption.
    #20
    #20
  39. McAfee Complete Data Protection

    (13)3.8 out of 5

    McAfee Complete Data Protection secures critical data on endpoints with encryption.

    Categories in common with Cloak and Dagger File Encryption Software:
  40. McAfee Complete Data Protection secures critical data on endpoints with encryption.

    Categories in common with Cloak and Dagger File Encryption Software:

    UF
    I love that this program helps keep your computer safe from all variances of harm! I also like that it scans automatically for me. It runs behind the scenes to help alert me to any known threats!