GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Encryption Software. Filters help you narrow down the results to find exactly what you’re looking for.
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.
Read more about GoodAccess
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them.
Read more about 1Password
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.
Read more about Symantec Endpoint Security
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.
Read more about TunnelBear
Code42's CrashPlan for Small Business is a global enterprise SaaS provider of endpoint data protection and security. Backup, restore and protect your data from anywhere with CrashPlan for Small Business.
Read more about CrashPlan
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.
Read more about Intercept X Endpoint
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.
Read more about Bitdefender GravityZone
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities
Read more about Passportal
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more
Read more about PureVPN
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.
In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.
Read more about OneLogin
Syxsense is an endpoint security software designed to help SecOps departments, managed service providers (MSPs), and IT professionals maintain threat prevention through authorization scanning, third-party patching, communication blocking from infected devices, and continuous collaboration.
Read more about Syxsense
MOVEit Managed File Transfer (MFT) software provides secure collaboration and automated file transfers of sensitive data. Organizations get complete visibility of all file transfers along with automated workflows that can replace scripting.
Read more about MOVEit
GlassWire is a network monitoring and security platform that provides businesses with tools including real time network monitoring, a built-in firewall, internet security features, alerts, bandwidth usage monitoring, and more. It offers an Android app to allow users to monitor networks on-the-go.
Read more about GlassWire
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.
Read more about HMA
Acronis Cyber Protect Cloud is a unique integration of backup with comprehensive anti-malware protection and endpoint management tools. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down.
Read more about Acronis Cyber Protect Cloud
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.
Read more about Automox
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.
Read more about Citrix Workspace
Perch Security is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks and connected devices via a unified portal.
Read more about Perch Security
Hotspot Shield is a private VPN that provides secure and private internet access by encrypting personal browsing information. Securely browse and stream videos, games, shows, sports, and movies anywhere in HD quality.
Read more about Hotspot Shield VPN
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.
Read more about Black Duck
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.
Read more about Hushmail
Avira Antivirus Pro is a comprehensive antivirus program that protects the identity and personal data of its users against malware. It is available for PCs and smartphones. The aim of the platform is to help users achieve the highest level of security while maintaining unimpaired device performance.
Read more about Avira Antivirus Pro
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more
Read more about EventSentry
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.
Read more about Bitium
Netsparker web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.
Read more about Netsparker
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.
Read more about Qualys Cloud Platform
Boxcryptor is a cross-platform cloud encryption software designed to help businesses secure their files. The platform integrates with a range of cloud storage providers including OneDrive and SharePoint (with Microsoft Teams integration) Dropbox, and more.
Read more about Boxcryptor
Indeni makes it easy to manage the infrastructure of digital businesses. Indeni Knowledge and Indeni Insight offers integrations to critical devices, built-in automation, and easy-to-read remediation instructions that allow IT users to move from reactive to proactive infrastructure management.
Read more about Indeni
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.
Read more about Files.com
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.
Read more about AwareGO
Veriato RansomSafe is a data protection and defense solution that protects businesses from ransomware attacks. It is designed to detect attacks before data damage or losses occur. Veriato RansomSafe includes features such as file backups, encryption protection, and rapid recovery to protect data.
Read more about Veriato RansomSafe
Read more about JScrambler
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Primarily designed to help development teams improve code quality and maintain compliance, HackEDU offers customized programs, certifications, progress tracking, and more.
Read more about HackEDU
WhiteSource is the leading solution for agile open source security and license compliance management.
It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.
Read more about WhiteSource
The Ubiq platform allows you to integrate data encryption directly into any application in minutes, with a few lines of code. It is interoperable across diverse applications and languages, storage types, and cloud environments.
Read more about Ubiq
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts listings by overall star rating, based on user reviews, highest to lowest.
Sorts listings by number of user reviews, highest to lowest.