Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

VeraCrypt

Show rating breakdown
51 reviews
  • 1 profiles
  • 1 categories
Average star rating
4.5
Serving customers since
Profile Filters

All Products & Services

Profile Name

Star Rating

43
6
2
0
0

VeraCrypt Reviews

Review Filters
Profile Name
Star Rating
43
6
2
0
0
NK
Nikos K.
06/15/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

VeraCrypt

VeraCrypt allows you to create hidden volumes within encrypted partitions. This feature enables you to store sensitive data discreetly, providing an additional layer of security. It also supports steganography, allowing you to hide encrypted data within other files or containers.
Verified User in Information Technology and Services
UI
Verified User in Information Technology and Services
01/03/2023
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

Best Free Tool

VC has a very robust and versatile toolchest. It has more and better options than some paid apps.
Ridham S.
RS
Ridham S.
Business Owner at Ridham Developer
04/24/2022
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

VeraCrypt: Free & Open-Source Disk Encryption Software That Must Have for Security

The most things I like about VerCrypt are as below: 1. If I want to encrypt a whole hard drive then It is possible in VeraCrypt and I like this feature very most among all other features. 2. The ability to establish a virtual encrypted disc within a document and afterward mounted the virtual encrypted disc as if it were a physical disc. 3. Availability of multiple algorithm options.

About

Contact

HQ Location:
Paris

Social

@VeraCrypt_IDRIX

What is VeraCrypt?

VeraCrypt is an open-source disk encryption software designed to provide robust security for data storage. This tool enhances security by encrypting entire storage devices or creating virtual encrypted disks within a file. VeraCrypt is known for its strong encryption algorithms and is widely used for protecting sensitive information against unauthorized access. It supports a variety of operating systems, including Windows, macOS, and Linux. As a successor to TrueCrypt, VeraCrypt addresses many of its predecessor's security vulnerabilities. The software is maintained by a community of developers and can be accessed and downloaded from its official website at [https://www.veracrypt.fr](https://www.veracrypt.fr).

Details