Help the communities most affected by the California wildfires in only a few minutes. We'll donate $10 for every review you submit.

Best Encryption Software

Encryption software uses cryptography to mask files, text, and data, protecting information from undesired parties. Companies utilize these tools to ensure their sensitive data is secured even in the event of a breach. Companies can apply this technology to communications, databases, and virtually any other kind of file. Encryption products provide capabilities to pick and choose which sets of information administrators deem too valuable to risk. The tools either integrate with or work in unison with whatever application is used for storage or information transfer. The encryption programs can usually obscure the content of data at rest and data in transit. The tools turn the information into ciphertext that only the original owner can decipher.

Many data security and mobile data security solutions function similarly to encryption software, but those tools are designated to more specific types of data and often provide additional functionalities.

To qualify for inclusion in the Encryption category, a product must:

  • Secure data and files using ciphertext
  • Prepare either data at rest or data in transit for encryption
  • Allow users to choose and manage files and their encryption settings
Learn More About Encryption
G2 Crowd Grid® for Encryption
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Filters
Features
Star Rating

Encryption reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Encryption Software
Results: 97
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    FileVault is a disk encryption program in Mac OS X 10.3 and later.


    Paubox is the easiest way to send and receive HIPAA compliant email. No other solution makes secure email so simple to use. Paubox is the only provider with Zero-Step Encryption on ALL sent email. Senders can just write and send emails as normal from any device and Paubox seamlessly encrypts the message from end-to-end, without the need for portals, plug-ins, or keywords. It's just as easy for recipients to view secure email sent to them. No keys to exchange, no passwords to remember, apps to download, or portals to login to. This is done through Paubox's patent-pending process that includes encrypting all outbound email through our servers with industry-standard Transport Layer Security (TLS) and up to 256-bit AES encryption. Paubox Encrypted Email can be deployed using existing domains and email platforms like Office 365, Exchange, and G Suite, or can be hosted by Paubox. Works with a variety of email clients including Apple Mail and Thunderbird All accounts include FREE inbound encryption and protection against SPAM, malware, virus and phishing attacks. Business Associate Agreements are included for no additional charge.


    With Box KeySafe, you have complete, independent control over your encryption keys, with no impact to the user experience.


    Windows PowerShell is a task-based command-line shell and scripting language designed especially for system administration.


    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.


    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.


    McAfee Complete Data Protection secures critical data on endpoints with encryption.


    Laptops and removable media devices have provided today’s mobile workforce the freedom to work anywhere. With this freedom comes a greater risk of a data breach through lost or stolen devices. Symantec Endpoint Encryption combines strong full-disk and removable media encryption with centralized management to protect sensitive information and ensure regulatory compliance. Symantec provides maximum protection by encrypting each drive, sector-by-sector, ensuring that all files are encrypted. In addition to protecting laptops and desktops, Endpoint Encryption supports various types of removable media including USB drives, external hard drives, and CD/DVD/Blu-ray media. With Symantec, removable media users can access their data on any Windows or Mac system, even if encryption isn’t installed on the machine.


    OpenSSL is an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.


    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.


    Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).


    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.


    From SSL, client and multi-domain (SAN) certificates to wildcard, code signing and email S/MIME, DigiCert provides a comprehensive portfolio of SSL/PKI security solutions for businesses of all shapes and sizes. Use our CertWizard to quickly and easily determine which solution best suits your needs based on: • What you want to secure (A single domain? Multiple domains? Unlimited subdomains? Apps and devices? Email? Code? Documents?) • What level of security you want (Standard or extended?) • And what price range you’re comfortable with



    Dell Data Protection offers comprehensive solutions with strong manageability to secure data.


    Data encryption for files on hard drives, portable devices and sent via email


    Symantec Desktop Email Encryption offers end-to-end email encryption for laptops and desktops.


    Boxcryptor is a end-to-end encryption for Dropbox & Co.



    Gpg4win securely transports emails and files with the help of encryption and digital signatures.


    Privatoria VPN Tor is a tool that encrypts user's data to its remote servers and enables to use public Internet through a secure VPN.


    With Proofpoint Email Encryption, messages and attachments are automatically encrypted with complete transparency. Users don't need to manually encrypt their email to send and receive messages securely—it just happens in the background. Email Encryption simplifies secure communications and leaves you in control.


    Hushmail is a email service with added important security features to help keep data safe.


    iSafeguard Security Suite is a secure encryption and digital signature solution for everyone, from big companies to individual users.


    Ki Design Anonymized Analytics converts identifying data into analytics, allowing you to transfer insights instead of identities.


    Enterprise Secure Key Manager (ESKM) is management solution to protect data.


    Covata SafeShare is a file sharing and collaboration solution that protects business information from breaches and enables governance and regulatory compliance requirements for ITAR & EAR and other regulation requirements. SafeShare ensures the storage, sharing, retrieval and collaboration of sensitive data remains streamlined, accessible and secure – within your organization’s network, outside your organization’s network, to mobile devices and to the cloud. SafeShare is available as a private or a public cloud solution.


    Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs' code.


    Symantec Command Line powered by PGP Technology enables organizations to quickly and easily integrate encryption into batch processes, scripts, and applications to ensure the security of corporate data at rest or in transit. Whether your challenge is protecting credit card information, financial transactions, payroll, medical records, or other confidential information, Command Line's scriptable encryption is a key part of an organization's data protection tool kit.


    Most cyber threats hide in encrypted communications up to 70 percent of all traffic. Symantec Proxy and SSL Visibility Appliance decrypt traffic, support infrastructure security to maintain privacy and data integrity.


    Symantec File Share Encryption allows users and groups to automatically or manually encrypt files and folders on laptops, desktops, and file servers for secure file sharing.


    Protect your information in email, whether in transit or at rest. Symantec Gateway Email Encryption provides centrally managed email encryption to secure email communications with customers and partners regardless of whether or not recipients have their own email encryption software. With Gateway Email Encryption, organizations can minimize the risk of a data breach while complying with regulatory mandates for information security and privacy.


    Linux Unified Key Setup is a disk encryption specification for Linux.


    AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.


    AuricVault Tokenization is a payment processing software that associates tokens with secure encrypted data. It encrypts the data it receives and then stores the encrypted data along with a random set of characters.


    Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requires no changes to the apps, and encrypts data at-rest, in use, in memory and in the search index. That’s complete data protection.


    Biocoded is a network security software that is an end-to-end encrypted voice call and messaging app by an opinion of independent security research groups.


    Bouncy Castle is a collection of APIs used in cryptography.


    Challenger is offered to encrypt at a data and directory level and is ideal for all security aware users, especially in areas such as patent development, development engineers, journalists, lawyers and upper level management.


    CipherBoard provides end-to-end encryption across any iPhone or android app, along with the fully functional keyboard.


    CIPHERBOND IS A SECURE COMMUNICATION APP FOR IOS AND ANDROID THAT PROVIDES END-TO-END ENCRYPTION FOR VOICE, MESSAGING AND FILE SHARING.


    CrococryptLib for Java and Android: The easiest way to integrate encryption into enterprise applications.


    Cryptainer SE provides network wide encryption based security implementation, using the existing hardware and software infrastructure of the enterprise.


    Cryptomator is an open source client-side encryption for Dropbox, Google Drive.


    DESwrap software is designed to give instant protection to .EXE and .DLL files.


    Difenso offers major groups, small companies and individuals an innovative and uniquely designed solution, easy to implement to protect all shared data.


    DriveCrypt is a disk encryption product that automatically encrypts data on desktop and laptop personal computers (PCs), as well as universal serial bus (USB) storage devices. The secure 1344-bit encryption is done automatically on the fly, so users do not have to change their workflow.


    Using the integrated ServiceNow Edge Encryption solution, your data is protected while in motion and at rest. Data moving between your data center and your ServiceNow instance passes through the proxy, which is configured to encrypt specific fields and attachments before they reach the instance.


    Trend Micro Email Encryption Solutions keeps your email confidential, simplifies compliance, including meeting GDPR requirements, and reduces management costs by removing the complexity from encryption.


    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.


    Learn More About Encryption Software

    BACK TO TOP
    Published: