Echoworx

Echoworx Alternatives & Competitors

Looking for alternatives to Echoworx? Tons of people want Encryption software to help with email encryption, full-disk encryption, and policy enforcement. What's difficult is finding out whether or not the software you choose is right for you. We have compiled a list of Encryption software that reviewers voted best overall compared to Echoworx. Based on reviewer data you can see how Echoworx stacks up to the competition, check reviews from current & previous users, and find the best fit for your business.

content

Top 20 Alternatives & Competitors to Echoworx

    #1
    #1
  1. Microsoft BitLocker

    (54)3.9 out of 5
    BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.
  2. BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.

    Microsoft BitLocker review by Katrina M.
    "bitlocker that free protection you need: the protection is free and simple to use, our IT was impressed how easy it was to setup and link in with azure AD we don't have to keep hold of the unique key password."
    #2
    #2
  3. FileVault

    (34)4.3 out of 5
    FileVault is a disk encryption program in Mac OS X 10.3 and later.
  4. FileVault is a disk encryption program in Mac OS X 10.3 and later.

    FileVault review by Ronald K S.
    "The best security for all Apple devices: FileVault is a highly secure encryption and encryption system for all types of files, and can run on any Apple device, it is easy to use, you can protect any file, folder, file, image, document, or what you want, with an encryption of high level, from a very simple application, you do not need to be a genius to use it, anyone can protect their information with this application in the simplest way, without complications, as happens in other data protection applications, which are complicated and you must be a computer professional to use it."
    #3
    #3
  5. AWS Certificate Manager

    (30)4.5 out of 5
    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
  6. AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.

    AWS Certificate Manager review by kalpesh d.
    "AWS Certificate Manager!!: i have 2-3 years of experience working with AWS Certificate Manager , i must say it's one of the coolest service provided by AWS for certification management purpose , by enabling this service you can get free SSL/TLS certificate for your business website , and in today's world this certification is must required for your business website to go live ,it's very much easy to integrate it with other AWS services , and it provides automatic renew feature which automatically renews all your existing certificates which are associated with your account and have crossed it's expiry date , you can also able to integrate with ELB and cloud front services easily ! ! "
    #4
    #4
  7. Sophos SafeGuard Encryption

    (25)3.8 out of 5
    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.
  8. Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Sophos SafeGuard Encryption review by Rick B.
    "Peace of mind, Invisible security!: I love that fact that Sophos Safeguard Encryption is applied to the entire hard drive and not just to a specific file or folder. I have to physically enter a password to just start the boot process. I live with the peace that if my laptop is stolen, all of my data is encapsulated with the vault that is Sophos Safeguard Encryption. Whilst in operation, you don't even know that the software is there and protecting you in the background."
    #5
    #5
  9. Symantec Endpoint Encryption

    (24)3.5 out of 5
    Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.
  10. Protect sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

    Symantec Endpoint Encryption review by Lissett d.
    "Endpoint Encryption : This program protects all my equipment, making the handling of all my files and emails more secure, now with the implementation of the GDRP we have benefited with this tool, since users do not have to do anything while protecting the emails and files that we use."
    #6
    #6
  11. Endpoint Encryption

    (27)4.3 out of 5
    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.
  12. Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.

    Endpoint Encryption review by Maria T.
    "Protege tu informacion valiosa con Endpoint Encryption: Hoy quiero hablarles de una maravillosa y potente solución de seguridad para pequeñas, medianas y grandes empresas, se trata de Endpoint Encryption herramienta desarrollada por la casa Trend Micro, se trata de una herramienta que sirve para proteger, cifrar o encriptar estaciones de trabajo enteras, y dispositivos extraibles como Pendrives, discos externos, tarjetas de memoria, etc. Y todo esto se puede realizar de manera centralizada desde la consola de esta maravillosa herramienta, la cual por cierto es muy sencilla de utilizar y posee una interfaz gráfica que resulta muy pero muy agradable para sus usuarios, razón por la cual es la mejor herramienta de si tupo que existe en la actualidad desde mi punto de vista claro esta."
    #7
    #7
  13. Tor

    (22)4.1 out of 5
    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.
  14. A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    Tor review by Just Sevilla .
    "Navegador para el anonimato.: Este software nos permite mantenernos en el anonimato hasta cierto punto con todos sus características con las que cuenta para poder modificar diferentes parámetros de niveles de seguridad, permite configurar el proxy, la censura de los continentes y saltar el firewall, y variar entre los diferentes niveles de seguridad que son el Estandar, Seguro y Muy Seguro."
    See all Tor reviews
    #8
    #8
  15. ZixEncrypt

    (21)4.6 out of 5
    ZixEncrypt removes the hassle of encrypted email and gives you peace of mind that your sensitive data is secure in email.
  16. ZixEncrypt removes the hassle of encrypted email and gives you peace of mind that your sensitive data is secure in email.

    ZixEncrypt review by Administrator
    "ZixEncrypt Review: Zix makes it easy to send encrypted messages with little to no setup. Point your servers to them, configure some rules, and it just works. Keyword encryption is simple as well and has been easy for my users to adapt to and begin using."
    #9
    #9
  17. TokenEx

    (17)4.6 out of 5
    Optimized for quick response
    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
  18. TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.

    TokenEx review by Adam F.
    "Best solution for tokenization: Our company likes TokenEx because they provide a secure payment iframe and transparent gateway, which allows us to reduce our PCI scope because our system never touches the card data. The tokens are not tied to a proprietary gateway so the tokens can be easily used across gateways and when switching gateways. The per-token cost is lower than other token providers. We also like that we can create sub accounts for our customers that we can manage globally."
    #10
    #10
  19. Letsencrypt

    (16)4.8 out of 5
    Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
  20. Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

    Letsencrypt review by Gabriel A.
    "Letsencrypt is the only free website encryption service I trust.: I love using Letsencrypt not only because it's free but also because it only takes me minutes to set up. Nowadays, it's hard to earn credibility if your website doesn't have a working SSL certificate. In fact, Google Chrome web browser often discourages people from visiting sites that don't have SSL encryption. And that's why Letsencrypt is an awesome service. And the best part is that it's available in almost all cPanels. Therefore, you don't have to install it or anything. All you need to do is to login to you web host, go to cPanel, click Let's Encrypt, and issue a security certificate to whichever domain you want to. It's that simple. "
    #11
    #11
  21. Cryptomator

    (15)4.8 out of 5
    Cryptomator is an open source client-side encryption for Dropbox, Google Drive.
  22. Cryptomator is an open source client-side encryption for Dropbox, Google Drive.

    Cryptomator review by Riley Violet M.
    "Cryptomator and Dropbox have to be together.: It is designed to provide safe and reliable protection. I like the protection it gives to all my Dropbox files and I love how easy it is to use it. Cryptomator has a free plan, this is something that I love. My files are totally private and I have the advantage of protecting them at low cost. Another positive point is the compatibility to a great variety of operating systems."
    #12
    #12
  23. Keybase

    (14)3.7 out of 5
    Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.
  24. Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it's open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can't leak your files or be hacked.

    Keybase review by Tobie W.
    "Keybase offers simple encryption out of the box, with free encrypted Git and chat!: I make good use of the Git, and the chat - for chatting to other developers. The file storage is also useful and rather simple to use. Keybase is also cross platform (including mobile)."
    #13
    #13
  25. VeraCrypt

    (14)4.4 out of 5
    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
  26. VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.

    VeraCrypt review by Christophe L.
    "VeraCrypt - Encryption is easy: Veracrypt is a solution that allows us to encrypt storage media. One of the main advantages is the ability to encrypt an unlimited number of hard drives or portable drives using Veracrypt so that we can safely transfer sensitive data between the office and home. Veracrypt has, many encryption algorithms to choose from, and also gives us the ability to create a hidden partition which is very useful when we share a computer or want to send data securely. VeraCrypt is an open-source program, therefore it is available for every user utterly free of charge on such platforms as (Windows/Linux/Mac OS). It is worth mentioning the possibility of encrypting the system partition. "
    #14
    #14
  27. Folder Lock

    (14)4.5 out of 5
    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.
  28. Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.

    Folder Lock review by Steve V. F.
    "The system that allows you to keep all your information safe: Folder Lock is one of the systems that I liked because it offers complete protection in terms of safeguarding my personal keys, guarding the folders with private information and very sensitive, you can even secure your pendrive or portable unit with this versatile system and rest assured that your essential information will not be filtered. This system without a doubt I like very much since its level of protection is very compact and closed, thanks to the level of security of military encryption that is practically impenetrable by hackers or malware specialized in stealing information."
    #15
    #15
  29. Symantec Desktop Email Encryption

    (14)3.8 out of 5
    Symantec Desktop Email Encryption offers end-to-end email encryption for laptops and desktops.
  30. Symantec Desktop Email Encryption offers end-to-end email encryption for laptops and desktops.

    Symantec Desktop Email Encryption review by User in Information Technology and Services
    "An Email protector: The reliability of this software is what I like the best. This software encrypts your email and its attachments. This email is far more safer than sending emails normally unencrypted. Also it provides virus protection too which is a pretty good addition to the software. So this software makes sure what you Recieve is dade and what you send is safe too. Once installed it is a pretty easy to use software."
    #16
    #16
  31. Box KeySafe

    (12)4.0 out of 5
    With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.
  32. With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.

    Box KeySafe review by User
    "Box is great for keeping and sharing documents securely.: I like that I can access box from my computer or my phone and easily share information with colleagues and team members. Each of us is able to access and make changes to the same folder at the same time, and it updates almost instantly."
    #17
    #17
  33. McAfee Complete Data Protection

    (12)3.8 out of 5
    McAfee Complete Data Protection secures critical data on endpoints with encryption.
  34. McAfee Complete Data Protection secures critical data on endpoints with encryption.

    McAfee Complete Data Protection review by User
    "Keeping yourself and your computer safe and secure: I love that this program helps keep your computer safe from all variances of harm! I also like that it scans automatically for me. It runs behind the scenes to help alert me to any known threats!"
    #18
    #18
  35. DiskCryptor

    (12)4.4 out of 5
    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.
  36. DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

    DiskCryptor review by Miguel Alejandro R.
    "It is an excellent program to encrypt partitions of hard disks, CD and DVD discs and USB memories. : I like to use DiskCryptor because it is an open source program that has the function of hard disk encryption in which it allows me to encrypt the Windows drive completely or partitions individually. The objective is to protect the entire unit of the system and carry it out at an immediate moment. Thanks to this application, all the data of the organization where I work are protected. In which, I keep them organized and safe because the use of the system requires a password that no one can access. What makes it exclusive as boot manager. "
    #19
    #19
  37. GnuPG

    (11)4.2 out of 5
    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.
  38. GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    GnuPG review by Nicola C.
    "Powerful encryption tool to protect your file/emails: GnuPG is a powerful tool to help you encrypt your data and your email. You can easily encrypt your email using an extension for your email client (like Enigmail for Thunderbird). GnuPG will help you increase the confidentiality of your communication using the most powerful encryption algorithm. Furthermore, since the interface is all CLI based, you can easily integrated gpg inside your CI system. So you can make sure that Jenkins or other build tools send encrypted emails. "
    #20
    #20
  39. Boxcryptor

    (11)4.6 out of 5
    Boxcryptor is a end-to-end encryption for Dropbox & Co.
  40. Boxcryptor is a end-to-end encryption for Dropbox & Co.

    Boxcryptor review by Adres Eloy P.
    "Boxcryptor, much more security.: Boxcryptor, manages to provide greater security to cloud-based information services, compatible with the most important providers of information storage on the web. Its installation is automatic, almost without the intervention of the user, it is easy to use and has a great technical support. It has several service options, one basic; free, but very limited in capabilities and ability, another very complete and relatively inexpensive personal option, and a business service with many important features and excellent benefits, something expensive for small businesses. It offers administrative functions; that allow to evaluate and audit the information, control the access and use of the same, allows to authorize or deny the access of devices, can create and assign different levels of access, among other functions. It is an excellent tool, after installed it works permanently and almost invisible for the common user."