Cloak and Dagger File Encryption Software

Cloak and Dagger File Encryption Software Alternatives & Competitors

Looking for alternatives to Cloak and Dagger File Encryption Software? Tons of people want Encryption software to help with email encryption, full-disk encryption, and policy enforcement. What's difficult is finding out whether or not the software you choose is right for you. We have compiled a list of Encryption software that reviewers voted best overall compared to Cloak and Dagger File Encryption Software. Based on reviewer data you can see how Cloak and Dagger File Encryption Software stacks up to the competition, check reviews from current & previous users, and find the best fit for your business.

content
Market Segment

Top 20 Alternatives & Competitors to Cloak and Dagger File Encryption Software

    #1
    #1
  1. Microsoft BitLocker

    (53)3.9 out of 5
    BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.
  2. BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.

    Microsoft BitLocker review by Katrina M.
    "bitlocker that free protection you need: the protection is free and simple to use, our IT was impressed how easy it was to setup and link in with azure AD we don't have to keep hold of the unique key password."
    #2
    #2
  3. FileVault

    (34)4.3 out of 5
    FileVault is a disk encryption program in Mac OS X 10.3 and later.
  4. FileVault is a disk encryption program in Mac OS X 10.3 and later.

    FileVault review by Ronald K S.
    "The best security for all Apple devices: FileVault is a highly secure encryption and encryption system for all types of files, and can run on any Apple device, it is easy to use, you can protect any file, folder, file, image, document, or what you want, with an encryption of high level, from a very simple application, you do not need to be a genius to use it, anyone can protect their information with this application in the simplest way, without complications, as happens in other data protection applications, which are complicated and you must be a computer professional to use it."
    #3
    #3
  5. Sophos SafeGuard Encryption

    (25)3.8 out of 5
    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.
  6. Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Sophos SafeGuard Encryption review by Rick B.
    "Peace of mind, Invisible security!: I love that fact that Sophos Safeguard Encryption is applied to the entire hard drive and not just to a specific file or folder. I have to physically enter a password to just start the boot process. I live with the peace that if my laptop is stolen, all of my data is encapsulated with the vault that is Sophos Safeguard Encryption. Whilst in operation, you don't even know that the software is there and protecting you in the background."
    #4
    #4
  7. Endpoint Encryption

    (27)4.3 out of 5
    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.
  8. Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.

    Endpoint Encryption review by Maria T.
    "Protege tu informacion valiosa con Endpoint Encryption: Hoy quiero hablarles de una maravillosa y potente solución de seguridad para pequeñas, medianas y grandes empresas, se trata de Endpoint Encryption herramienta desarrollada por la casa Trend Micro, se trata de una herramienta que sirve para proteger, cifrar o encriptar estaciones de trabajo enteras, y dispositivos extraibles como Pendrives, discos externos, tarjetas de memoria, etc. Y todo esto se puede realizar de manera centralizada desde la consola de esta maravillosa herramienta, la cual por cierto es muy sencilla de utilizar y posee una interfaz gráfica que resulta muy pero muy agradable para sus usuarios, razón por la cual es la mejor herramienta de si tupo que existe en la actualidad desde mi punto de vista claro esta."
    #5
    #5
  9. Tor

    (21)4.0 out of 5
    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.
  10. A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Tor review by Just Sevilla .
    "Navegador para el anonimato.: Este software nos permite mantenernos en el anonimato hasta cierto punto con todos sus características con las que cuenta para poder modificar diferentes parámetros de niveles de seguridad, permite configurar el proxy, la censura de los continentes y saltar el firewall, y variar entre los diferentes niveles de seguridad que son el Estandar, Seguro y Muy Seguro."
    See all Tor reviews
    #6
    #6
  11. Letsencrypt

    (15)4.8 out of 5
    Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
  12. Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

    Letsencrypt review by Izan S.
    "Free SSL certificates: Its all free, very easy to install and setup. Instant verification and compatibility with all web hosting panels and web servers. It comes with a handy API to make certificates via plugins and its very efficient."
    #7
    #7
  13. Cryptomator

    (14)4.8 out of 5
    Cryptomator is an open source client-side encryption for Dropbox, Google Drive.
  14. Cryptomator is an open source client-side encryption for Dropbox, Google Drive.

    Cryptomator review by Deepthi G.
    "comfort and simple backup tool: Cryptomator provide us to create encrypted versions of our files in cloud storage and others are not able to read the contents of our file which provides more privacy.There is no fee for subscription just download and watch.Simple to use and even minor changes are reflected in the encrypted file and sync is possibe.Major advantage is this can be used in windows,Linux ,MAC and android.Easy to configure."
    #8
    #8
  15. Keybase

    (14)3.7 out of 5
    Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.
  16. Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.

    Keybase review by Tobie W.
    "Keybase offers simple encryption out of the box, with free encrypted Git and chat!: I make good use of the Git, and the chat - for chatting to other developers. The file storage is also useful and rather simple to use. Keybase is also cross platform (including mobile)."
    #9
    #9
  17. Folder Lock

    (13)4.5 out of 5
    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.
  18. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Folder Lock review by Euro Enrique R.
    "There no 100% total secure files, but is really close: I am computer science teacher and one of the first thing I teach my students es privacy and security of your personal information in your computer. Folder Lock is simple tools to everyone, not only for encrypting in a simple way your personal files, but a simple way to make backups."
    #10
    #10
  19. VeraCrypt

    (13)4.4 out of 5
    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
  20. VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    VeraCrypt review by Mariusz M.
    "VeraCrypt - Data security is essential.: Veracypt is one of the best open source solutions for data encryption on the market. It gives us a few, the ability to encrypt not only selected files or partitions, but also entire operating systems (so called Full Disk Encryption) and mobile devices. We can also choose an encryption algorithm for our data. Compatibility with other systems is worth mentioning. "
    #11
    #11
  21. Box KeySafe

    (12)4.0 out of 5
    With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.
  22. With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

    Box KeySafe review by User
    "Box is great for keeping and sharing documents securely.: I like that I can access box from my computer or my phone and easily share information with colleagues and team members. Each of us is able to access and make changes to the same folder at the same time, and it updates almost instantly."
    #12
    #12
  23. DiskCryptor

    (12)4.4 out of 5
    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.
  24. DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

    DiskCryptor review by Miguel Alejandro R.
    "It is an excellent program to encrypt partitions of hard disks, CD and DVD discs and USB memories. : I like to use DiskCryptor because it is an open source program that has the function of hard disk encryption in which it allows me to encrypt the Windows drive completely or partitions individually. The objective is to protect the entire unit of the system and carry it out at an immediate moment. Thanks to this application, all the data of the organization where I work are protected. In which, I keep them organized and safe because the use of the system requires a password that no one can access. What makes it exclusive as boot manager. "
    #13
    #13
  25. GnuPG

    (11)4.2 out of 5
    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.
  26. GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    GnuPG review by Nicola C.
    "Powerful encryption tool to protect your file/emails: GnuPG is a powerful tool to help you encrypt your data and your email. You can easily encrypt your email using an extension for your email client (like Enigmail for Thunderbird). GnuPG will help you increase the confidentiality of your communication using the most powerful encryption algorithm. Furthermore, since the interface is all CLI based, you can easily integrated gpg inside your CI system. So you can make sure that Jenkins or other build tools send encrypted emails. "
    #14
    #14
  27. ZixEncrypt

    (8)4.4 out of 5
    ZixEncrypt removes the hassle of encrypted email and gives you peace of mind that your sensitive data is secure in email.
  28. ZixEncrypt removes the hassle of encrypted email and gives you peace of mind that your sensitive data is secure in email.

    ZixEncrypt review by Administrator in Information Technology and Services
    "ZixGateway: Zix gateway keeps critical confidential information encrypted between parties. Even if the user doesn't manually encrypt it via an outlook plugin or using a keyword. You can create policies that let the user know that their email contained content that needed to be encrypted. With zixgateway we no longer need to keep track of individual Zix licenses throughout our organization. Policies are easily made with prebuilt definitions for PII, HIPAA, SSNs ect. "
    #15
    #15
  29. Dell Data Protection

    (6)4.3 out of 5
    Dell Data Protection offers comprehensive solutions with strong manageability to secure data.
  30. Dell Data Protection offers comprehensive solutions with strong manageability to secure data.

    Dell Data Protection review by Tony L.
    "DDP - Encryption Done Easy: The best part about DDP is that everything I need to manage an endpoint is in one place. I install the software on the client, point it at the server and it does everything for me automatically. "
    #16
    #16
  31. ESET Endpoint Encryption

    (7)3.5 out of 5
    Data encryption for files on hard drives, portable devices and sent via email
  32. Data encryption for files on hard drives, portable devices and sent via email

    ESET Endpoint Encryption review by Fernando C.
    " ESET Endpoint Encryption is a powerful ally for your web security: ESET compatibility with NTFS and ReFS is extremely useful and offers you several forms of storage. Another strong point is its low power consumption, even when operating at maximum ESET will not make your machine slow or have a big drop in performance."
    #17
    #17
  33. Boxcryptor

    (4)4.3 out of 5
    Boxcryptor is a end-to-end encryption for Dropbox & Co.
  34. Boxcryptor is a end-to-end encryption for Dropbox & Co.

    Boxcryptor review by Rosmar M.
    " Boxcryptor, greater security for your cloud.: Boxcryptor, is compatible with almost all cloud hosting services. It is a very easy to use system, it has a magnificent online support and it is explained very simple, you will not have difficulties for its implementation. When you install it for the first time, Boxcryptor recognizes all the cloud service providers that are installed on your system, and usually you do not have to do anything else to make it work perfectly, he is in charge of configuring everything you need, and only asks you for the validation of the information. It has an initial step-by-step guide that guides you throughout the process and it is very easy to follow the instructions. Boxcryptor, offers a free basic service. But, you are limited to protecting only one data provider in the cloud. Its application, is very simple, and has other features that allow you to monitor the activity and status of your information. It is an excellent security program."
    #18
    #18
  35. SecureDoc

    (3)3.7 out of 5
    By simplifying data security, SecureDoc can help save time and reduce costs associated with security management.
  36. By simplifying data security, SecureDoc can help save time and reduce costs associated with security management.

    SecureDoc review by Jackson S.
    " SecureDoc gives you the security your backups deserve: Like the lightness of the tool, Seguredoc is an efficient backup tool, at first you should think that this automatically makes it a heavy program that will affect the performance of your computers, but this does not happen, Garantioc is really light and even when it is performing a great backup yet it is almost imperceptible in the computer, you will have your backips safe and you will not have to pay with the performance drop of your maquionas so."
    #19
    #19
  37. AxCrypt

    (3)3.8 out of 5

  38. AxCrypt review by Trina C.
    "AxCrypt: AxCrypt is a very easy to use encryption software"
    #20
    #20
  39. IBM Multi-Cloud Data Encryption

    (2)4.5 out of 5
    Safeguards data from misuse whether it resides in single cloud, multiple clouds or hybrid environments.
  40. Safeguards data from misuse whether it resides in single cloud, multiple clouds or hybrid environments.

    IBM Multi-Cloud Data Encryption review by User
    " Great for Business: The usability of it is what makes it great. The data encryption made our company info secure and was a great selling point for our clients. The reps are happy to help talk you through some of the best features that your clients will also value in a company, I guarantee it!"