Choose a language
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.
By VeraCrypt
Re-claim Profile
This profile hasn’t been active for over a year. If you work at VeraCrypt, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.
Once approved, you can:
Update your company and product details
Boost your brand's visibility on G2, search and LLMs
Access insights on visitors and competitors
Respond to customer reviews
We’ll verify your work email before granting access.
How would you rate your experience with VeraCrypt?
Email Encryption
As reported in 23 VeraCrypt reviews.
Encrypts the content of emails and their attachments.
Messaging Encryption
This feature was mentioned in 23 VeraCrypt reviews.
Encrypts messages being sent via text or within an application.
File Transfer Encryption
This feature was mentioned in 34 VeraCrypt reviews.
Protects data with within or as it leaves your secure or local network.
Data Encryption
As reported in 37 VeraCrypt reviews.
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Based on 37 VeraCrypt reviews.
Provides a level of encryption for text documents.
Full-Disk Encryption
This feature was mentioned in 36 VeraCrypt reviews.
Encrypts entire device to secure data in case it is lost or stolen.
Authentication
As reported in 36 VeraCrypt reviews.
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
31 reviewers of VeraCrypt have provided feedback on this feature.
Abilities to set standards for database security and risk management.
Access Management
33 reviewers of VeraCrypt have provided feedback on this feature.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
As reported in 29 VeraCrypt reviews.
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
This feature was mentioned in 35 VeraCrypt reviews.
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Anomaly Detection
Based on 29 VeraCrypt reviews.
Monitors activity within networks and alerts administrators when unusual activity occurs.