# Best Encryption Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Encryption software uses cryptography to protect the confidentiality and integrity of data. Companies use encryption software to ensure that only intended parties can access the data and to reduce their liability if the data is inadvertently exposed or hacked. Encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered virtually unusable to others. Companies can apply encryption to communications, databases, and virtually any other kind of file or storage system. Encryption can be applied to data at rest, data in transit, and data in use. The [best encryption software](https://learn.g2.com/best-encryption-software) can be particularly useful for securing regulated data such as personally identifiable information (PII), protected health information (PHI), and payment card industry (PCI) data.

Using [sensitive data discovery software](https://www.g2.com/categories/sensitive-data-discovery), administrators can identify their most sensitive datasets on which to apply encryption.

To qualify for inclusion in the Encryption category, a product must:

- Secure data and files using ciphertext
- Prepare either data at rest, data in transit, or data in use for encryption
- Allow users to choose and manage files and their encryption settings





## Best Encryption Software At A Glance

- **Leader:** [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews)
- **Highest Performer:** [NordLocker](https://www.g2.com/products/nordlocker/reviews)
- **Easiest to Use:** [Virtru Email Encryption](https://www.g2.com/products/virtru-email-encryption/reviews)
- **Top Trending:** [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews)
- **Best Free Software:** [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews)


---

**Sponsored**

### Cyera

Cyera is the world’s leading AI-native data security platform. Its platform gives organizations a complete view of where their data lives, how it’s used, and how to keep it safe, so they can reduce risk and unlock the full value of their data, wherever it is. Backed by more than $1.3 billion in funding from top-tier investors including Accel, Coatue, Cyberstarts, Georgian, Lightspeed, and Sequoia, Cyera’s unified data security platform helps businesses discover, secure, and leverage their most valuable asset - data - and eliminate blind spots, cut alert noise, and protect sensitive information across the cloud, SaaS, databases, AI ecosystems, and on-premise environments. Recent innovations like Cyera’s Omni DLP extend this platform with adaptive, AI-native data loss protection, bringing real-time intelligence and contextual understanding to how data moves and is used across the enterprise.



[Visit company website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1079&amp;secure%5Bdisplayable_resource_id%5D=1011677&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1859&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1214164&amp;secure%5Bresource_id%5D=1079&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fencryption-software%3Fopen_modal_url%3D%252Fproducts%252Fgpg4win%252Fwishlists%253Fhost_path%253D%25252Fcategories%25252Fencryption-software%2526source%253Dcategory&amp;secure%5Btoken%5D=55bcb72d3d7652a71ad406bb2d866d1683c0df60a788543d38da2c8da24eaf8d&amp;secure%5Burl%5D=https%3A%2F%2Fwww.cyera.com%2Fdemo%3Futm_medium%3Dreferral%26utm_source%3Dg2&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews)
  Progress MOVEit software helps IT operations, enterprise architecture, security and compliance teams automate and secure enterprise file transfers while supporting strict regulatory requirements such as HIPAA, PCI DSS and GDPR. When file transfer volumes grow and oversight requirements tighten, fragmented tools and manual processes can increase operational risk, cause productivity fire drills and add complexity to audit preps. Progress MOVEit Transfer centralizes managed file transfer activity into a single, controlled environment to improve visibility, governance and reliability of mission-critical data flows. Progress MOVEit Cloud extends these capabilities through a fully managed, auditor-certified SaaS deployment that leverages the same documented controls, encryption, detailed audit logging and role-based access without the burden of infrastructure management or software upgrades. Progress MOVEit Automation adds no-code, policy-driven file transfer orchestration that replaces manual scripting, reducing errors that lead to missed SLAs and delays in downstream workflows. MOVEit Automation supports the protocols businesses use today (SFTP, FTPS, HTTPS and more) and seamlessly connects to legacy and cloud endpoints with native connectors. Together, MOVEit Transfer, MOVEit Cloud and MOVEit Automation help regulated organizations or businesses with private data reduce risk, improve operational efficiency and maintain consistent control over data movement. Start your 30-day trial, get a quote, or request more information at www.progress.com/moveit


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 519

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.1/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Progress Software](https://www.g2.com/sellers/progress-software)
- **Company Website:** https://www.progress.com/
- **Year Founded:** 1981
- **HQ Location:** Burlington, MA.
- **Twitter:** @ProgressSW (48,823 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/progress-software/ (4,205 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Administrator
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 40% Mid-Market, 39% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (59 reviews)
- File Transfer (45 reviews)
- Automation (36 reviews)
- Customer Support (27 reviews)
- Features (26 reviews)

**Cons:**

- Complexity (25 reviews)
- Difficult Learning (18 reviews)
- Integration Issues (16 reviews)
- Security Issues (12 reviews)
- Slow Performance (9 reviews)

  ### 2. [Virtru Secure Share](https://www.g2.com/products/virtru-secure-share/reviews)
  Virtru Secure Share is a cloud-native secure file transfer solution designed to simplify sharing sensitive documents. Advanced encryption, customizable access controls, and complete data visibility ensure a seamless and secure user experience. Users maintain full control over their data, with the ability to revoke access at any time—providing peace of mind when sharing sensitive information such as intellectual property, personally identifiable information (PII), personal healthcare information (PHI), and other regulated data. Accessible via any web browser or integrated with popular business applications like Google Drive, Zendesk, and Confluence, Virtru Secure Share delivers robust file protection wherever your files are shared.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 111

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.4/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.4/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Virtru](https://www.g2.com/sellers/virtru)
- **Company Website:** https://virtru.com
- **Year Founded:** 2012
- **HQ Location:** Washington, DC
- **Twitter:** @virtruprivacy (1,794 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/virtru/ (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care, Financial Services
  - **Company Size:** 43% Mid-Market, 31% Small-Business


#### Pros & Cons

**Pros:**

- Security (66 reviews)
- Ease of Use (62 reviews)
- Secure Sharing (51 reviews)
- File Sharing (41 reviews)
- Data Protection (29 reviews)

**Cons:**

- Access Limitations (21 reviews)
- Email Issues (20 reviews)
- Not User-Friendly (14 reviews)
- Email Encryption Issues (13 reviews)
- Access Issues (12 reviews)

  ### 3. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,181

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.5/10 (Category avg: 9.3/10)
- **Document Encryption:** 8.0/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,921 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Mid-Market, 42% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

  ### 4. [Virtru Email Encryption](https://www.g2.com/products/virtru-email-encryption/reviews)
  Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), intellectual property, and other regulated information. Seamlessly integrating with platforms like Gmail and Microsoft Outlook, Virtru empowers organizations to meet compliance requirements for HIPAA, GDPR, CJIS, CMMC 2.0, ITAR and other data privacy regulations, without disrupting existing workflows. Virtru provides full control over email content even after it’s been sent. Users can set expiration dates, revoke access, and track where emails are shared, ensuring total visibility and control over sensitive information. With granular access control and audit trails, Virtru simplifies data protection for enterprises and small businesses alike. Ideal for industries such as healthcare, financial services, government, and education, Virtru empowers your teams to confidently share sensitive information without sacrificing security.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 402

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.4/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Virtru](https://www.g2.com/sellers/virtru)
- **Company Website:** https://virtru.com
- **Year Founded:** 2012
- **HQ Location:** Washington, DC
- **Twitter:** @virtruprivacy (1,794 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/virtru/ (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Administrative Assistant
  - **Top Industries:** Hospital &amp; Health Care, Health, Wellness and Fitness
  - **Company Size:** 45% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (80 reviews)
- Security (78 reviews)
- Encryption (66 reviews)
- Email Encryption (56 reviews)
- Secure Communication (45 reviews)

**Cons:**

- Email Issues (55 reviews)
- Email Encryption Issues (44 reviews)
- Access Issues (29 reviews)
- Encryption Issues (26 reviews)
- Access Limitations (20 reviews)

  ### 5. [Microsoft BitLocker](https://www.g2.com/products/microsoft-bitlocker/reviews)
  BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 7.8/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,090,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 40% Small-Business, 36% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (13 reviews)
- Encryption Security (7 reviews)
- Security (7 reviews)
- Data Protection (5 reviews)
- Centralized Management (3 reviews)

**Cons:**

- Key Recovery (7 reviews)
- Limited OS Compatibility (5 reviews)
- Manual Intervention Required (4 reviews)
- Slow Performance (3 reviews)
- Compatibility Issues (1 reviews)

  ### 6. [Signal](https://www.g2.com/products/open-whisper-systems-signal/reviews)
  Signal is a privacy-focused messaging application that offers end-to-end encrypted communication for text messages, voice calls, and video calls. Designed to prioritize user security, Signal ensures that only the intended recipients can access the content of the communications, safeguarding against potential eavesdropping by third parties. The app is available across multiple platforms, including Android, iOS, Windows, macOS, and Linux, making it accessible to a wide range of users. Key Features and Functionality: - End-to-End Encryption: Utilizes the Signal Protocol to encrypt messages, voice calls, and video calls, ensuring that only the sender and recipient can access the content. - Secure Voice and Video Calls: Provides encrypted voice and video calling capabilities, including group calls, maintaining privacy across all communication channels. - No Data Collection: Operates without collecting user metadata, such as contact lists or communication logs, enhancing user privacy. - Disappearing Messages: Offers a feature where messages can be set to automatically delete after a specified time, adding an extra layer of security. - Open-Source Code: Maintains transparency by making its source code publicly available, allowing for independent security audits and fostering trust among users. Primary Value and User Solutions: Signal addresses the growing concern over digital privacy by providing a secure platform for personal and professional communication. By implementing robust encryption and minimizing data collection, it ensures that users can communicate without fear of surveillance or data breaches. This is particularly valuable for individuals and organizations that handle sensitive information and require a trustworthy communication tool to maintain confidentiality.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 447

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.8/10 (Category avg: 9.3/10)
- **Document Encryption:** 8.3/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 7.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Signal](https://www.g2.com/sellers/signal-86a5fae3-be96-4a40-8b50-4f5fd2b6cbfb)
- **Year Founded:** 2013
- **HQ Location:** San Francisco, CA
- **Twitter:** @signalapp (611,945 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/signal-messenger/ (107 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Senior Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 69% Small-Business, 22% Mid-Market


#### Pros & Cons

**Pros:**

- Security (53 reviews)
- Ease of Use (33 reviews)
- User Interface (17 reviews)
- Features (15 reviews)
- Communication (12 reviews)

**Cons:**

- Missing Features (14 reviews)
- File Sharing Issues (7 reviews)
- Connectivity Issues (5 reviews)
- Learning Curve (4 reviews)
- Limited Features (4 reviews)

  ### 7. [FileVault](https://www.g2.com/products/filevault/reviews)
  FileVault is a disk encryption program in Mac OS X 10.3 and later.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 32

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.5/10 (Category avg: 8.9/10)
- **Document Encryption:** 9.4/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Apple](https://www.g2.com/sellers/apple)
- **Year Founded:** 1976
- **HQ Location:** Cupertino, CA
- **Twitter:** @Apple (9,923,208 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/162479/ (180,534 employees on LinkedIn®)
- **Ownership:** NASDAQ:AAPL

**Reviewer Demographics:**
  - **Top Industries:** Marketing and Advertising
  - **Company Size:** 37% Small-Business, 34% Enterprise


  ### 8. [Tresorit](https://www.g2.com/products/tresorit/reviews)
  Tresorit is a secure content collaboration platform built to help individuals and organizations store, sync, and share sensitive information without sacrificing privacy. It brings encrypted storage, file sharing, collaboration, data rooms, and e-signatures into one product family, and is trusted by thousands of organizations worldwide. Tresorit is part of Swiss Post and positions itself as a privacy-first alternative to mainstream cloud tools for teams handling confidential files, regulated data, or client-facing work. At the core of Tresorit is zero-knowledge, end-to-end encryption. Files are encrypted on the user’s device before they are uploaded, and the encryption keys remain inaccessible to Tresorit—meaning Tresorit cannot read customer content. This architecture is designed to protect files even in scenarios where infrastructure is compromised, because plaintext data isn’t stored on Tresorit servers. Tresorit also emphasizes cryptographic design choices intended to avoid leakage through content matching or server-side visibility. For daily work, Tresorit SecureCloud provides an encrypted workspace for internal collaboration and external exchange. It supports secure file storage, syncing, and team collaboration while aiming to keep workflows simple for end users. Tresorit also offers personal and business plans, positioning personal use as an encrypted vault for sensitive documents and business use as a secure workspace that supports IT control, governance, and collaboration. Tresorit’s Drive experience lets users access encrypted content through familiar interfaces like Windows File Explorer and macOS Finder, including “cloud-only” access to avoid storing all files locally. This helps teams work efficiently while maintaining centralized control. Admins can also take action if a device is lost or compromised—for example, revoking access and unlinking the device to reduce risk. For external sharing, Tresorit FileSharing focuses on secure delivery with strong access control. Sharing links can be protected with expiration rules, passwords, watermarks, and restrictions on download or printing, with detailed activity tracking and auditing. Tresorit also integrates into email workflows like Outlook and Gmail to help reduce the risks of sending sensitive attachments, while keeping sharing secure and manageable. For structured client collaboration, Tresorit Engage provides encrypted, customizable data rooms built for ongoing projects rather than one-off transactions. It supports role-based access control, templates, document and task management, granular permissions, and branded client experiences—useful for industries like legal, finance, consulting, HR, and any scenario involving recurring confidential exchanges with external stakeholders. Tresorit extends beyond storage and sharing with Tresorit eSign, which combines document signing with encrypted file handling. It includes support for EU-qualified electronic signatures, enabling high-trust signing workflows aligned with strict legal and regulatory expectations. Tresorit also offers Tresorit Email Encryption, enabling users to send encrypted emails directly from Outlook, and provides integration options designed for organizations that need secure communication without forcing recipients into complex setups. On compliance and assurance, Tresorit highlights strong security validation and certifications. It is ISO 27001:2022 certified and has achieved Common Criteria EAL4+ certification, reflecting structured security governance and independently evaluated assurance. Tresorit also supports compliance needs such as GDPR, HIPAA (including BAA support), and other frameworks often referenced by regulated industries. For data sovereignty, it offers data residency choices across multiple regions, allowing organizations to align storage locations with legal, contractual, or internal governance requirements.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 249

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.3/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Tresorit](https://www.g2.com/sellers/tresorit)
- **Year Founded:** 2011
- **HQ Location:** Zurich, Zurich
- **Twitter:** @Tresorit (7,465 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2449399/ (138 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, Manager
  - **Top Industries:** Information Technology and Services, Non-Profit Organization Management
  - **Company Size:** 85% Small-Business, 13% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (98 reviews)
- Security (85 reviews)
- File Sharing (64 reviews)
- Secure Sharing (57 reviews)
- Security Focus (36 reviews)

**Cons:**

- Access Limitations (24 reviews)
- Expensive (23 reviews)
- File Management Issues (20 reviews)
- Syncing Issues (19 reviews)
- File Sharing Issues (18 reviews)

  ### 9. [Sophos Intercept X](https://www.g2.com/products/sophos-sophos-intercept-x/reviews)
  Sophos Intercept X is a comprehensive endpoint security solution designed to protect organizations from a wide range of cyber threats. Utilizing advanced technologies such as deep learning and anti-exploit measures, it effectively detects and prevents both known and unknown malware, ransomware, and zero-day exploits. Managed through the cloud-based Sophos Central platform, Intercept X offers streamlined deployment and management, ensuring robust protection with minimal system impact. Key Features and Functionality: - Deep Learning Technology: Employs advanced machine learning to identify and block new and previously unseen malware without relying on traditional signatures. - Anti-Ransomware with CryptoGuard: Detects and halts malicious encryption processes, automatically restoring affected files to their original state to mitigate ransomware attacks. - Exploit Prevention: Blocks over 60 exploit techniques used by attackers to compromise systems, steal credentials, and distribute malware. - Behavioral Analysis: Monitors system behavior to identify and stop malicious activities, including fileless attacks that operate directly from memory. - Managed Threat Response (MTR): Provides 24/7 threat hunting, detection, and response services delivered by a team of Sophos experts. - Centralized Management: Offers a unified management console via Sophos Central, simplifying policy configuration, reporting, and alert management. Primary Value and User Benefits: Sophos Intercept X delivers a multi-layered defense strategy that addresses the evolving landscape of cyber threats. By integrating deep learning and exploit prevention technologies, it proactively stops attacks before they can cause harm. The inclusion of CryptoGuard ensures that ransomware threats are neutralized, with automatic file restoration minimizing downtime and data loss. The MTR service adds an extra layer of security by providing continuous monitoring and expert intervention when necessary. With its centralized management through Sophos Central, organizations can efficiently oversee their security posture, ensuring comprehensive protection with reduced administrative overhead.


  **Average Rating:** 3.9/5.0
  **Total Reviews:** 33

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.5/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,719 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)
- **Ownership:** LSE:SOPH

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 52% Mid-Market, 30% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (3 reviews)
- Encryption (3 reviews)
- Threat Protection (3 reviews)
- Cybersecurity (2 reviews)
- Efficiency (2 reviews)

**Cons:**

- Complex Setup (1 reviews)
- Installation Issues (1 reviews)
- Poor Documentation (1 reviews)
- Poor Interface Design (1 reviews)
- UX Improvement (1 reviews)

  ### 10. [WatchGuard Network Security](https://www.g2.com/products/watchguard-network-security/reviews)
  For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMBs and distributed enterprise organizations, our award-winning Unified Threat Management (UTM) appliances are designed from the ground up to focus on ease of deployment, use, and ongoing management, in addition to providing the strongest security possible.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 246

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.2/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.0/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [WatchGuard](https://www.g2.com/sellers/watchguard)
- **Company Website:** https://www.watchguard.com
- **Year Founded:** 1996
- **HQ Location:** Seatle, WA
- **Twitter:** @watchguard (19,437 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/166878/ (1,218 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 53% Mid-Market, 44% Small-Business


#### Pros & Cons

**Pros:**

- Cybersecurity (3 reviews)
- Ease of Use (3 reviews)
- Customer Support (2 reviews)
- Integrations (2 reviews)
- Security (2 reviews)

**Cons:**

- Expensive (3 reviews)
- Complex Setup (1 reviews)
- Difficult Installation (1 reviews)
- Lack of Interfaces (1 reviews)
- Limited Customization (1 reviews)

  ### 11. [Kaspersky Next Optimum](https://www.g2.com/products/kaspersky-next-optimum/reviews)
  Kaspersky Next Optimum is the ideal choice for small and mid-sized businesses with lean cybersecurity teams. The offering is uniting in itself with strong endpoint protection, essential detection and response capabilities (EDR), and a seamless upgrade to XDR and MXDR for sophisticated cybersecurity. Layers of Kaspersky Next Optimum: • Kaspersky Next EDR Foundations – Powerful ML-based EPP, flexible security controls and EDR root cause analysis tools equip you with the most straightforward way to build a strong foundation for your cybersecurity. • Kaspersky Next EDR Optimum – Combines strong endpoint protection with enhanced controls, patch and encryption management, training for IT staff, cloud security and more – all boosted by essential EDR functionality to help you deflect attacks rapidly, with minimal demand on your resources. • Kaspersky Next XDR Optimum – In addition to exceptional EPP and automatic response capabilities that help identify, analyze and neutralize evasive threats, the solution gives you affordable, user-friendly detection and response tools that go beyond endpoints, as well as access to our online learning platform to raise the security awareness of your employees. • Kaspersky Next MXDR Optimum – Get expert-managed protection against sophisticated threats, delivered by Kaspersky’s globally renowned SOC experts with 24/7 infrastructure monitoring – while keeping essential XDR capabilities in-house.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 194

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.5/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.5/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Kaspersky](https://www.g2.com/sellers/kaspersky-bce2dc7f-2586-4e87-96da-114de2c40584)
- **Year Founded:** 1997
- **HQ Location:** Moscow
- **Twitter:** @kasperskylabind (1,293 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaspersky/ (4,494 employees on LinkedIn®)
- **Phone:** 1-866-328-5700

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 47% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Blocking (5 reviews)
- Ease of Use (5 reviews)
- Threat Protection (5 reviews)
- Protection (4 reviews)
- Threat Detection (4 reviews)

**Cons:**

- High Resource Usage (6 reviews)
- Slow Performance (5 reviews)
- Compatibility Issues (2 reviews)
- Complex Setup (2 reviews)
- Difficult Configuration (2 reviews)

  ### 12. [IBM Vault (formerly HashiCorp Vault)](https://www.g2.com/products/ibm-vault-formerly-hashicorp-vault/reviews)
  IBM Vault (formerly HashiCorp Vault) tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault&#39;s main use cases include: - Secrets Management - Identity Brokering - Data Encryption


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 45

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.2/10 (Category avg: 9.3/10)
- **Document Encryption:** 0.0/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [HashiCorp](https://www.g2.com/sellers/hashicorp)
- **Company Website:** https://www.hashicorp.com/
- **Year Founded:** 2012
- **HQ Location:** San Francisco, CA
- **Twitter:** @hashicorp (102,020 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2830763/ (2,193 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 41% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (1 reviews)
- Ease of Use (1 reviews)
- Easy Integrations (1 reviews)
- Easy Management (1 reviews)
- Integrations (1 reviews)

**Cons:**

- Expensive (1 reviews)

  ### 13. [Dell Data Protection](https://www.g2.com/products/dell-data-protection/reviews)
  Dell Data Protection Suite is a comprehensive software solution designed to safeguard critical data across diverse IT environments, including physical, virtual, and cloud infrastructures. It offers a unified platform for backup, recovery, and management, ensuring data integrity and availability. Key Features and Functionality: - Comprehensive Data Protection: Supports a wide range of applications, databases, and platforms, providing consistent protection across various environments. - Cloud Integration: Facilitates backup to cloud, backup in-cloud, long-term retention, and cloud disaster recovery, enhancing flexibility and scalability. - Advanced Cyber Resilience: Employs machine learning algorithms for anomaly detection, offering proactive defense against cyber threats and ensuring rapid recovery from incidents. - Automated Operations: Features automated policy management and discovery of databases, virtual machines, file systems, and Kubernetes containers, streamlining data protection processes. - Flexible Deployment Options: Offers both on-premises and cloud-based deployment models, catering to the specific needs of organizations of all sizes. Primary Value and User Solutions: Dell Data Protection Suite addresses the critical need for robust data security in an era of increasing cyber threats and complex IT infrastructures. By providing a centralized and automated approach to data protection, it simplifies management, reduces operational overhead, and ensures business continuity. Organizations benefit from enhanced data resilience, compliance with regulatory requirements, and the confidence that their data assets are secure and recoverable in any scenario.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.1/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.4/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [Dell Technologies](https://www.g2.com/sellers/dell-technologies-decced23-0884-427d-88d4-718c9d1d4ea6)
- **Year Founded:** 1984
- **HQ Location:** Round Rock, TX
- **Twitter:** @Dell (794,011 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/delltechnologies/ (123,563 employees on LinkedIn®)
- **Ownership:** NYSE: DELL

**Reviewer Demographics:**
  - **Company Size:** 62% Enterprise, 43% Mid-Market


#### Pros & Cons


**Cons:**

- Slow Performance (1 reviews)
- Software Instability (1 reviews)

  ### 14. [AWS Wickr](https://www.g2.com/products/aws-wickr/reviews)
  Wickr Business is a collaborative messaging app for teams.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,220,862 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business, 25% Mid-Market


  ### 15. [NordLocker](https://www.g2.com/products/nordlocker/reviews)
  NordLocker Business is an encrypted cloud storage platform for storing, sharing, and managing business data securely. Developed by cybersecurity experts, it ensures business files can be accessed anywhere and anytime — but only by authorized parties. Manage all accounts that are part of your organization and create dedicated groups to share data securely with the right people. NordLocker’s secure storage uses an end-to-end encryption algorithm to secure your files in the cloud. All data is encrypted with a unique key that gives you complete access control. NordLocker Business allows you to create a highly secure work environment where you can safely store sensitive data and share it with the members of your organization and your business partners. Main features: - End-to-end encrypted cloud - Storage up to 2TB - Customized cloud solution for any type of business - Encrypted file sharing - Any type of file will do - Multi-factor authentication - Automatic backup across the devices - Admin panel for efficient team management


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.0/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.1/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Nord Security](https://www.g2.com/sellers/nord-security)
- **Year Founded:** 2012
- **HQ Location:** Global
- **Twitter:** @NordPass (9,474 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/nordsecurity/ (1,883 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 56% Small-Business, 26% Enterprise


#### Pros & Cons

**Pros:**

- Data Protection (2 reviews)
- Data Security (2 reviews)
- Encryption (2 reviews)
- Accessibility (1 reviews)
- Customer Support (1 reviews)

**Cons:**

- Limited Storage (2 reviews)

  ### 16. [Trend Micro Endpoint Encryption](https://www.g2.com/products/trend-micro-endpoint-encryption/reviews)
  Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 30

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 7.8/10 (Category avg: 9.3/10)
- **Document Encryption:** 7.3/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 6.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Company Size:** 51% Mid-Market, 29% Small-Business


  ### 17. [VGS Platform](https://www.g2.com/products/very-good-security-vgs-platform/reviews)
  Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profitability. VGS secures that information in an encrypted token vault; enabling our customers to de-risk their technical environment and achieve compliance certifications like PCI DSS, SOC 2, GDPR, and more, faster. VGS delivers a modern solution to collect, protect, and exchange sensitive data that spans from data privacy to payment acceptance and card issuance; providing businesses with tokenization, PCI compliance, data security, processor optionality, and the ability to operate on that data without compromising their security posture. VGS delivers a modern payments security solution that gives businesses ownership and control over critically valuable customer data, granting them maximum portability, operationality, and value extraction. VGS customers decouple the value and utility of data from the associated security and compliance risks and allow customers to achieve continuous PCI DSS compliance 16x faster, at 25% the cost of a DIY approach.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.8/10 (Category avg: 9.3/10)
- **Document Encryption:** 8.9/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Very Good Security](https://www.g2.com/sellers/very-good-security)
- **Year Founded:** 2015
- **HQ Location:** San Francisco, California
- **Twitter:** @getvgs (1,430 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/18142614/ (452 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 51% Mid-Market, 45% Small-Business


  ### 18. [Symantec Encryption](https://www.g2.com/products/symantec-encryption/reviews)
  Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector-by-sector, ensuring that all files are encrypted. In addition to protecting laptops and desktops, Endpoint Encryption supports various types of removable media including USB drives, external hard drives, and CD/DVD/Blu-ray media. With Symantec, removable media users can access their data on any Windows or Mac system, even if encryption isn’t installed on the machine.


  **Average Rating:** 3.7/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.8/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.7/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.4/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Broadcom](https://www.g2.com/sellers/broadcom-ab3091cd-4724-46a8-ac89-219d6bc8e166)
- **Year Founded:** 1991
- **HQ Location:** San Jose, CA
- **Twitter:** @broadcom (62,960 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/broadcom/ (55,707 employees on LinkedIn®)
- **Ownership:** NASDAQ: CA

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Enterprise, 30% Mid-Market


#### Pros & Cons


**Cons:**

- Difficult Navigation (1 reviews)

  ### 19. [Tor](https://www.g2.com/products/tor/reviews)
  Tor is a free and open-source software that enables anonymous communication over the internet by directing traffic through a worldwide, volunteer-operated network of servers. This process conceals a user&#39;s location and usage from surveillance and traffic analysis, ensuring privacy and freedom online. Key Features and Functionality: - Anonymity: Tor routes internet traffic through a series of encrypted relays, making it difficult to trace the origin of the data. - Privacy Protection: By encrypting data multiple times and sending it through various nodes, Tor safeguards users against network surveillance and traffic analysis. - Access to Blocked Content: Tor allows users to bypass censorship and access websites and services that may be restricted in their region. - Onion Services: Tor supports the creation of &quot;.onion&quot; sites, which are accessible only through the Tor network, providing anonymity for both users and service providers. Primary Value and User Solutions: Tor addresses the need for privacy and freedom in online communications. It protects users from surveillance, tracking, and censorship by anonymizing their internet activities. This is particularly valuable for individuals in regions with restricted internet access, journalists communicating with sources, activists organizing under oppressive regimes, and anyone seeking to maintain their privacy online. By using Tor, users can access the internet without fear of being monitored or having their data collected, thus promoting free expression and access to information.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.6/10 (Category avg: 9.3/10)
- **Document Encryption:** 7.9/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Tor](https://www.g2.com/sellers/tor)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @torproject (457,848 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10681658/ (58 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 58% Small-Business, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Accessibility (1 reviews)
- Affordable (1 reviews)
- Centralized Management (1 reviews)
- Cybersecurity (1 reviews)
- Data Protection (1 reviews)

**Cons:**

- Connectivity Issues (1 reviews)
- Slow Performance (1 reviews)

  ### 20. [7Z](https://www.g2.com/products/7z/reviews)
  7z is a high-compression archive format developed by 7-Zip, designed to offer superior compression ratios and robust encryption capabilities. Its open architecture allows for the integration of various compression, conversion, and encryption methods, making it a versatile choice for efficient data storage and transfer. Key Features and Functionality: - High Compression Ratio: Utilizes advanced algorithms like LZMA and LZMA2 to achieve significant data compression, reducing file sizes effectively. - Strong AES-256 Encryption: Ensures data security by encrypting files with the AES-256 standard, safeguarding sensitive information. - Support for Large Files: Capable of handling files up to 16 exbibytes, accommodating extensive data sets without compromising performance. - Unicode File Names: Supports Unicode, allowing for the use of international characters in file names, enhancing compatibility across different languages. - Solid Compression: Combines multiple files into a single compressed stream, improving compression efficiency, especially for similar files. - Archive Header Compression: Compresses archive headers to further reduce overall archive size. Primary Value and User Solutions: The 7z format addresses the need for efficient data compression and secure storage. By offering high compression ratios, it minimizes storage requirements and accelerates file transfers. Its robust AES-256 encryption ensures that sensitive data remains protected, making it ideal for both personal and professional use. The format&#39;s support for large files and Unicode file names enhances its versatility, catering to a wide range of user needs. Overall, 7z provides a reliable and efficient solution for managing and securing large volumes of data.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.3/10 (Category avg: 9.3/10)
- **Document Encryption:** 8.5/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 7.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [7-Zip](https://www.g2.com/sellers/7-zip-010b09ee-620f-40b1-aef0-014b12217aaf)
- **HQ Location:** N/A
- **Twitter:** @7zip (1,137 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/No-Linkedin-Presence-Added-Intentionally-By-DataOps (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 38% Enterprise


  ### 21. [Microsoft SEAL](https://www.g2.com/products/microsoft-seal/reviews)
  Microsoft SEAL is an open-source, cross-platform library developed by Microsoft Research that enables computations directly on encrypted data through homomorphic encryption. This allows developers to perform operations on sensitive information without exposing it, ensuring data privacy and security. Key Features and Functionality: - Homomorphic Encryption Schemes: Supports the BFV scheme for exact computations on encrypted integers and the CKKS scheme for approximate computations on encrypted real or complex numbers. - Cross-Platform Compatibility: Written in standard C++ with no external dependencies, making it compatible with various operating systems, including Windows, macOS, Linux, and Android. - Compression Support: Offers data compression using the DEFLATE algorithm to reduce memory usage when serializing objects like encryption parameters and keys. - .NET Support: Provides a .NET Standard library for seamless integration into .NET applications. Primary Value and Problem Solved: Microsoft SEAL empowers developers to build applications that can process sensitive data while maintaining confidentiality. By enabling computations on encrypted data, it eliminates the need to decrypt information, thereby reducing the risk of data breaches and unauthorized access. This is particularly valuable in sectors like healthcare, finance, and cloud computing, where data privacy is paramount.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 15

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.2/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.0/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,090,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Company Size:** 47% Small-Business, 40% Enterprise


  ### 22. [Oracle Advanced Security](https://www.g2.com/products/oracle-advanced-security/reviews)
  Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle&#39;s defense-in-depth, multi-layered database security solution.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 8.7/10 (Category avg: 9.3/10)
- **Document Encryption:** 8.8/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (826,383 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Reviewer Demographics:**
  - **Company Size:** 55% Enterprise, 35% Mid-Market


  ### 23. [IXOPAY](https://www.g2.com/products/tokenex-ixopay/reviews)
  TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 8.9/10)
- **Data Encryption:** 10.0/10 (Category avg: 9.3/10)
- **Document Encryption:** 10.0/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [TokenEx](https://www.g2.com/sellers/tokenex)
- **Year Founded:** 2010
- **HQ Location:** Edmond, Oklahoma
- **Twitter:** @TokenEx (1,209 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1614702/ (22 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 47% Small-Business, 41% Mid-Market


  ### 24. [VeraCrypt](https://www.g2.com/products/veracrypt/reviews)
  VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 50

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 6.7/10 (Category avg: 8.9/10)
- **Data Encryption:** 9.4/10 (Category avg: 9.3/10)
- **Document Encryption:** 9.4/10 (Category avg: 8.9/10)
- **Policy Enforcement:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [VeraCrypt](https://www.g2.com/sellers/veracrypt)
- **HQ Location:** Paris
- **Twitter:** @VeraCrypt_IDRIX (4,941 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/veracrypt/about/ (1 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 43% Enterprise, 35% Mid-Market


  ### 25. [@work](https://www.g2.com/products/work/reviews)
  @work is a secure workplace collaboration suite designed to bring your whole company together at an optimum value.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 26

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [eUnite](https://www.g2.com/sellers/eunite)
- **Year Founded:** 2003
- **HQ Location:** Irvine, US
- **LinkedIn® Page:** https://www.linkedin.com/company/euniteinc/ (72 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 38% Small-Business, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Convenience (1 reviews)
- Ease of Use (1 reviews)
- Efficiency (1 reviews)
- Security (1 reviews)
- Task Management (1 reviews)

**Cons:**

- Difficult Navigation (1 reviews)
- Learning Curve (1 reviews)
- Performance Issues (1 reviews)
- Slow Speed (1 reviews)



## Parent Category

[Confidentiality Software](https://www.g2.com/categories/confidentiality)



## Related Categories

- [Data Masking Software](https://www.g2.com/categories/data-masking)
- [Cloud Data Security Software](https://www.g2.com/categories/cloud-data-security)
- [Data De-Identification Tools](https://www.g2.com/categories/data-de-identification)



---

## Buyer Guide

### What You Should Know About Encryption Software

### What is Encryption Software?

Companies use encryption software to protect the confidentiality of their data, ensure that only intended parties can access the data, and reduce their liability if the data is inadvertently exposed or hacked.&amp;nbsp;

At a basic level, encryption software protects data by converting normal data into scrambled, unintelligible data that is rendered unusable to others. Most commonly, companies use encryption software to protect sensitive data such as their customers’ personally identifiable information (PII), proprietary company data such as trade secrets, and communications such as company emails or business instant messaging. Encryption can be applied to files, folders, disks, other storage products including cloud storage, and for secure communications such as transferring data over networks.&amp;nbsp;

Encryption has historically been used for protecting military communications, however, with the rise of the internet and online storage, many companies use encryption to protect corporate assets, as well. Particularly with the increasing cyber threats and requirements from data protection and data privacy regulations, more and more companies are using encryption software to protect their data and reduce risks and liability in the event the data is lost or stolen. In fact, many data privacy regulations specifically cite properly encrypted data as sufficiently protected and therefore either out of scope of the regulation or subject to less intensive regulatory scrutiny.&amp;nbsp;

Encryption software works by using modern cryptography methods to convert data from legible plaintext to unintelligible ciphertext using a pair of cryptographic keys. The original data is converted from plaintext to ciphertext using an encoding key known as a cipher, while the permissioned recipient of the data would use the corresponding decoding key to decrypt the data in order to return it to usable plaintext. Without the appropriate decryption key, the data is virtually unusable by interceptors or other non permissioned parties.&amp;nbsp;

Cryptographic keys to both encode and decode encrypted data come as either symmetric or asymmetric keys. With symmetric keys, the key used to encode the data is the same key needed to decode it. This requires the key itself to be closely guarded.&amp;nbsp; With asymmetric keys, however, the two keys are different—one key is a public key and the other key is a private key. A public key can be openly distributed to other parties, while the private key should be closely protected by its owner. A message can be encrypted using a recipient’s public key of the key pair, while only the recipient’s private key has the ability to decrypt it. Companies can protect and manage their encryption keys by utilizing [encryption key management software](https://www.g2.com/categories/encryption-key-management) solutions.

#### What Types of Encryption Software Exist?

Encryption software can be used to protect data at rest, such as data stored in files and folders, data in transit, such as data being transferred over networks or mobile devices, and more recently data in use, particularly when processing data stored in cloud storage.

**Encryption for data at rest**

Data at rest is data that is in storage and is not actively being used. This data can be stored on physical storage devices, in databases, data warehouses, on mobile devices, laptops, other endpoints, and in cloud storage. Data encryption software is used to protect this data from being accessed, modified, or stolen while at rest. Common types of encryption solutions for these include file encryption, folder encryption, database encryption, full-disk encryption, hard drive encryption, USB encryption, application encryption, and other storage encryption.

**Encryption for data in transit**

Data in transit is data that is traveling over networks like the internet, internal corporate networks like corporate local area networks (LAN), and mobile networks. Data in transit is sometimes referred to as data in motion, as well. Encryption is used for data in transit to prevent plaintext data from being intercepted by unauthorized persons like hackers. If the data is encrypted and intercepted while in transit, the data has little or no value to the party that intercepted it. Common types of encryption solutions for data in transit include network encryption, mobile data encryption, and website encryption.

**Encryption for data in use**

Risks to data in use are becoming more prevalent as more companies employ cloud computing resources to analyze data. Previously, unencrypted data was most at risk of interception or unauthorized disclosure during states of transit or at rest, but with greater use of processing in cloud computing, data can become susceptible to inappropriate disclosure or leaks during processing, as well. To address this risk, companies are beginning to utilize a technique known as homomorphic encryption.&amp;nbsp;

Homomorphic encryption allows the processing of data while it remains encrypted; homomorphic encryption does not require the dataset to be decrypted prior to processing. Companies can store encrypted data in the cloud, run operations on that encrypted data without decrypting it, and the results of that computation will remain in an encrypted format, requiring the same encryption key to decrypt the computational results as would be needed to decrypt the initial data set.&amp;nbsp;&amp;nbsp;

### What are the Common Features of Encryption Software?

The following are some core features within encryption software that can help users:

**Encryption layer** : Encryption software may be tailored to the medium needing to be encrypted. Specific encryption software can include solutions for full-disk encryption, file encryption, database encryption, data encryption, application encryption, endpoint encryption, network encryption, email encryption, and other communication encryption.&amp;nbsp;&amp;nbsp;

**Encryption key management** : Some encryption software solutions include encryption key management functions within their offerings. Encryption key management software handles the administration, distribution, and secure storage of encryption keys.&amp;nbsp;

**Encryption algorithms** : There are many encryption algorithms available with different strengths and speeds. One of the most common encryption algorithms is the Advanced Encryption Standards (AES), which is used by the US military, known as military-grade encryption. The most common AES encryption types are AES-128 encryption or AES-256 bit encryption, known as military-grade encryption. Other common encryption algorithms include Rivest–Shamir–Adleman or RSA algorithm, Triple Data Encryption Standard (TripleDES), Blowfish encryption algorithm, Twofish encryption algorithm, the international data encryption algorithm (IDEA), and more.&amp;nbsp;

### What are the Benefits of Encryption Software?

Encryption software helps companies meet regulatory compliance and operationalize their data security models. In particular, encryption technology can help companies achieve parts of the CIA triad, which stands for confidentiality, integrity, and availability of data, a commonly used security model.&amp;nbsp;

**Confidentiality** : One of the primary use cases for using encryption software is to protect the confidentiality of data, particularly sensitive data like PII. In the event that data is intercepted by an unsanctioned party, encrypted data is rendered virtually useless.&amp;nbsp;

**Integrity** : In addition to protecting the confidentiality of data, it is important for companies to trust that the data has not been tampered with, particularly when data is in transit. Encryption helps ensure that data has not been deleted or modified by unauthorized parties as it moves.

**Reduced legal risk or compliance:** Many data privacy and data protection regulations specifically cite encrypted data as sufficiently secured and subject to no or less stringent regulatory measures. Encryption can be particularly useful for working with datasets such as PII, protected health information (PHI), and payment card industry (PCI) data.

### Who Uses Encryption Software?

**Information security (InfoSec) professionals**: Individuals working to secure websites, [application security](https://www.g2.com/categories/application-security), and [network security](https://www.g2.com/categories/network-security) often choose encryption solutions to increase the effectiveness of security professionals. Encryption tools can add an additional level of security to virtually any IT infrastructure solution. The tools make it harder for hackers to penetrate networks or gain access to sensitive data. Encrypted files and encrypted data are also more difficult and less useful to hackers since they can’t actually view data without deciphering it first.

**Data professionals:** Encryption software allows database managers to create access standards and perform security tests to audit existing security. Many databases can store encrypted data in [backup software](https://www.g2.com/categories/backup) in the case of a disaster for easy, secure recovery. [Mobile data security software](https://www.g2.com/categories/mobile-data-security) provides similar features but adds increased security for mobile devices, communications, and authentication.&amp;nbsp;

#### Software Related to Encryption Software

Related solutions that can be used together with encrypting software include:

[Email encryption software](https://www.g2.com/categories/email-encryption) **:** Email encryption technology is used to transform and secure information traveling through an email server. These tools ensure data in transit remains secure until the authorized party is identified to prevent emails from ending up in the wrong hands. Email encryption can be useful in any industry but is a requirement for others. Medical records and government data are both examples of information that must be encrypted before being shared.

[Encryption key management software](https://www.g2.com/categories/encryption-key-management) **:** Encryption key management software is used to handle the administration, distribution, and storage of encryption keys.&amp;nbsp;

[Sensitive data discovery software](https://www.g2.com/categories/sensitive-data-discovery) **:** Sensitive data discovery software helps businesses locate sensitive data—such as PII, PHI, PCI data, intellectual property (IP), and other important business data—stored across multiple company systems including databases and applications, as well as on user endpoints.

[Data de-identification and pseudonymity software](https://www.g2.com/categories/data-de-identification-and-pseudonymity) **:** De-identification and pseudonymity software replaces personal identifying data in datasets with artificial identifiers, or pseudonyms. Companies choose to de-identify or pseudonymize (also called tokenize) their data to reduce their risk of holding PII and comply with privacy and data protection laws such as the CCPA and GDPR.&amp;nbsp;

[Data masking software](https://www.g2.com/categories/data-masking) **:** Data masking software, or data obfuscation software, is similar to but different from data de-identification and pseudonymity software. With data masking, sensitive data retains its actual identifying features (such as age range and zip code), but masks (or redacts, blanks, or hashes) identifying information such as name, addresses, phone numbers, and other sensitive data. It is possible to remove the data mask and reidentify the data. Data masking is often used as a way companies maintain sensitive data, but prevent misuse of data by employees or insider threats.

[Digital rights management (DRM) software](https://www.g2.com/categories/digital-rights-management-drm) **:** DRM software provides users with a variety of features intended to safeguard their content and ensure it is accessed within their designated parameters. Businesses are constantly sharing files internally and externally, and many others share branded assets or host media files regularly. DRM solutions protect the content shared or hosted by businesses and ensure it’s only used in the way originally intended. DRM software can provide features like watermarking and timed expiration for shared documents, and subscription and license management for media files.&amp;nbsp;

[Virtual private network (VPN) software](https://www.g2.com/categories/virtual-private-network-vpn) **:** VPNs enable users to connect to private, secure networks. Companies utilize corporate VPNs to provide their employees with secure, encrypted, and remote access to the company’s internal network. This enables employees to access applications, files, printers, and other corporate resources on the corporate network as if they were at the office.

[Password manager software](https://www.g2.com/categories/password-manager) **:** Password managers store and control a user&#39;s passwords through either an encrypted vault downloaded to a user’s computer or mobile device, or digitally through browser plugins or extensions. These solutions often require multi-factor authentication prior to accessing the filevault where passwords are stored with a folder lock. Password manager solutions are often cross-platform and operate on PCs, Mac, Android, iPhone, ioS, and other devices.

### Challenges with Encryption Software

**Performance** : Strong encryption requires more resources. It is important for companies to carefully weigh the strength of their encryption algorithms against the computational resources they have and the speed needed to encrypt and decrypt their data. The more secure the encryption algorithms are, the more computation power needed for them.&amp;nbsp;

**Quantum computing** : An emerging threat to encryption is quantum computing. Encrypting today is generally secure because the possible combinations for the decrypting encryption keys are so vast that in practice, it is virtually impossible to guess and test that many combinations. For example, decrypting an RSA-2048 bit encryption key, which has 2^2048 distinct numbers, is estimated to take a classical computer 300 trillion years. With the vast computing power of quantum computers, however, it is theorized that cracking an RSA-2048 bit encryption key could take as little as ten seconds to a few hours. As of now, quantum computers are not available for general use in the market, so the risk in practice is low, but theoretically, it does exist.

### Which Companies Should Buy Encryption Software?

All companies can benefit from safeguarding their data using encryption software, however, companies in regulated markets, such as healthcare, financial services, and those handling PII and other sensitive data should use encryption software as part of their information security practices.&amp;nbsp;

### How to Buy Encryption Software

#### Requirements Gathering (RFI/RFP) for Encryption Software

Companies must determine their specific encryption program&#39;s needs; what kind of data they are trying to secure—data at rest, data in transit, or data in use and what type of sensitive information, sensitive files, and other secure files do they need to protect. Buyers must have answers to the following questions when selecting encryption software for their business:

- Do you have individual files, specific storage types, or networks that you are seeking to secure?&amp;nbsp;
- Do you want an open-source solution?&amp;nbsp;
- Do you need a free version?&amp;nbsp;
- Do you prioritize encryption strength over speed?&amp;nbsp;
- Do you have the right computational resources to support your encryption method?&amp;nbsp;
- Do regulations in your industry recommend specific encryption algorithms?&amp;nbsp;

#### Compare Encryption Software Products

**Create a long list**

After determining the specific business needs, buyers must create a long list of products that can meet their company’s unique requirements. G2.com’s [encryption software](https://www.g2.com/categories/encryption)page compares encryption software solutions with reviews from verified users of encryption software to assist in narrowing the product search.&amp;nbsp;

**Create a short list**

After reviewing the long list, businesses should narrow their choices of products that can meet the company’s unique requirements by reading reports for that category of software. G2.com’s reports for [encryption software](https://www.g2.com/categories/encryption)helps compare how users of encryption software solutions rated these products.

**Conduct demos**

The next step includes contacting vendors to conduct demos of their solutions. Buyers must ask them questions about their solution, how they’ve assisted other similar companies, and how they answer the list of company-specific questions regarding encryption strength, speed, medium, and so on.&amp;nbsp;&amp;nbsp;

#### Selection of the Best Encryption software

**Choose a selection team**

It is important to include day-to-day users of encryption software on the selection team. Typically, this would be an InfoSec professional, an information technology (IT) professional, or a data professional. In a regulated industry, it is important to include representatives from the team’s compliance or legal departments on the selection team, as well.&amp;nbsp;

**Negotiation**

The cost of encryption software can vary greatly depending on what the buyer is trying to secure, the volume of data, and any other solutions the buyer may want in conjunction with encryption software, such as sensitive data discovery.&amp;nbsp;

**Final decision**

Since encryption software is a data security product, the final product decision will likely be made by information security teams and data professionals, in conjunction with collaborating with business stakeholders to ensure the solution meets both the business’ security needs and the usefulness of accessing the data.




