G2 Crowd gives a real-time look at how dreamforce sponsors and exhibitioners stack up.

Best Encryption Software

Encryption software uses cryptography to mask files, text, and data, protecting information from undesired parties. Companies utilize these tools to ensure their sensitive data is secured even in the event of a breach. Companies can apply this technology to communications, databases, and virtually any other kind of file. Encryption products provide capabilities to pick and choose which sets of information administrators deem too valuable to risk. The tools either integrate with or work in unison with whatever application is used for storage or information transfer. The encryption programs can usually obscure the content of data at rest and data in transit. The tools turn the information into ciphertext that only the original owner can decipher.

Many data security and mobile data security solutions function similarly to encryption software, but those tools are designated to more specific types of data and often provide additional functionalities.

To qualify for inclusion in the Encryption category, a product must:

  • Secure data and files using ciphertext
  • Prepare either data at rest or data in transit for encryption
  • Allow users to choose and manage files and their encryption settings
Learn More About Encryption
G2 Crowd Grid® for Encryption
High Performers
Market Presence
Compare Encryption Software
    Results: 79

    Star Rating

    Encryption reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    FileVault is a disk encryption program in Mac OS X 10.3 and later.

    PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.

    Paubox is the easiest way to send and receive HIPAA compliant email. No other solution makes secure email so simple to use. Paubox is the only provider with Zero-Step Encryption on ALL sent email. Senders can just write and send emails as normal from any device and Paubox seamlessly encrypts the message from end-to-end, without the need for portals, plug-ins, or keywords. It's just as easy for recipients to view secure email sent to them. No keys to exchange, no passwords to remember, apps to download, or portals to login to. This is done through Paubox's patent-pending process that includes encrypting all outbound email through our servers with industry-standard Transport Layer Security (TLS) and up to 256-bit AES encryption. Paubox Encrypted Email can be deployed using existing domains and email platforms like Office 365, Exchange, and G Suite, or can be hosted by Paubox. Works with a variety of email clients including Apple Mail and Thunderbird All accounts include FREE inbound encryption and protection against SPAM, malware, virus and phishing attacks. Business Associate Agreements are included for no additional charge.

    Windows PowerShell is a task-based command-line shell and scripting language designed especially for system administration.

    A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

    OpenSSL is an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.

    Symantec Endpoint Encryption provides full-disk and removable media encryption with robust management capabilities.

    Lets Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

    From SSL, client and multi-domain (SAN) certificates to wildcard, code signing and email S/MIME, DigiCert provides a comprehensive portfolio of SSL/PKI security solutions for businesses of all shapes and sizes. Use our CertWizard to quickly and easily determine which solution best suits your needs based on: • What you want to secure (A single domain? Multiple domains? Unlimited subdomains? Apps and devices? Email? Code? Documents?) • What level of security you want (Standard or extended?) • And what price range you’re comfortable with

    McAfee Complete Data Protection secures critical data on endpoints with encryption.

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    DiskCryptor is an open encryption solution that offers encryption of all disk partitions, including the system partition.

    Boxcryptor is a end-to-end encryption for Dropbox & Co.

    Privatoria VPN Tor is a tool that encrypts user's data to its remote servers and enables to use public Internet through a secure VPN.

    Covata SafeShare is a file sharing and collaboration solution that protects business information from breaches and enables governance and regulatory compliance requirements for ITAR & EAR and other regulation requirements. SafeShare ensures the storage, sharing, retrieval and collaboration of sensitive data remains streamlined, accessible and secure – within your organization’s network, outside your organization’s network, to mobile devices and to the cloud. SafeShare is available as a private or a public cloud solution.

    Symantec Desktop Email Encryption offers end-to-end email encryption for laptops and desktops.

    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.

    Dell Data Protection offers comprehensive solutions with strong manageability to secure data.

    Gpg4win securely transports emails and files with the help of encryption and digital signatures.

    iSafeguard Security Suite is a secure encryption and digital signature solution for everyone, from big companies to individual users.

    Ki Design Anonymized Analytics converts identifying data into analytics, allowing you to transfer insights instead of identities.

    Enterprise Secure Key Manager (ESKM) is management solution to protect data.

    Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs' code.

    Symantec File Share Encryption allows users and groups to automatically or manually encrypt files and folders on laptops, desktops, and file servers for secure file sharing.

    Linux Unified Key Setup is a disk encryption specification for Linux.

    AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

    Baffle's solution goes beyond simple encryption to truly close gaps in the data access model. The technology protects against some of the most recent high profile attacks. It's easy to deploy, requires no changes to the apps, and encrypts data at-rest, in use, in memory and in the search index. That’s complete data protection.

    Challenger is offered to encrypt at a data and directory level and is ideal for all security aware users, especially in areas such as patent development, development engineers, journalists, lawyers and upper level management.

    CipherBoard provides end-to-end encryption across any iPhone or android app, along with the fully functional keyboard.


    Cryptainer SE provides network wide encryption based security implementation, using the existing hardware and software infrastructure of the enterprise.

    DriveCrypt is a disk encryption product that automatically encrypts data on desktop and laptop personal computers (PCs), as well as universal serial bus (USB) storage devices. The secure 1344-bit encryption is done automatically on the fly, so users do not have to change their workflow.

    Using the integrated ServiceNow Edge Encryption solution, your data is protected while in motion and at rest. Data moving between your data center and your ServiceNow instance passes through the proxy, which is configured to encrypt specific fields and attachments before they reach the instance.

    With Proofpoint Email Encryption, messages and attachments are automatically encrypted with complete transparency. Users don't need to manually encrypt their email to send and receive messages securely—it just happens in the background. Email Encryption simplifies secure communications and leaves you in control.

    Trend Micro Email Encryption Solutions keeps your email confidential, simplifies compliance, including meeting GDPR requirements, and reduces management costs by removing the complexity from encryption.

    Transparent Data Encryption for any application or database on the Windows Platform. Physical, Virtual or Cloud. SQL Server, MySQL, Web Servers, Legacy Applications. With Centralized Key Management. No programming required.

    Using a private password, users can encrypt emails on local devices using Enlocked's web-based "Enlock Anywhere," plugin or mobile app. Recipients can read messages using a temporary key or sign up to gain their own private password access. Although Enlocked provides a password hint utility, they neither store passwords nor encrypted messages.

    Data encryption for files on hard drives, portable devices and sent via email

    The ESP solutions incorporate a core set of tools to include robust functionality, an intuitive interface and the capability to compartmentalize data by individual users, organizations or customized groups. These tools enable our clients to manage projects, collaborate on areas of interest and to disseminate information quickly and easily to other participants.

    Gemalto Enterprise Encryption applies security and access controls directly to your sensitive structured and unstructured data - wherever it resides.

    Hushmail is a email service with added important security features to help keep data safe.

    SSL (Secure Socket Layer) allows information to travel from browser to server and back again using a secured transmission tunnel to combat eavesdropping. Verification amount depends on the style of SSL certficate involved.

    InvisibleSecrets encrypts data and files and keeps them safe for secure transfer in emails or across the internet. The file encryption lets users encrypt and hide files directly from Windows Explorer and automatically transfer them by email or via the internet. Users can also hide files in places that appear innocent, such as pictures, sound files, or webpages.

    Securely manage all of your organization's IronKey enterprise secure storage devices and DataLocker H300/H350 or Sentry EMS secure storage devices with cloud-based or on-premises management.

    Jetico Enterprise Data Protection protects sensitive data throughout the lifecycle.

    KeypadSuit is providing a strong security of input date from user *Supprot Android, iOS, Mobile web, E2E

    Kruptos 2 Professional is an easy to use file encryption program that uses 256-bit encryption to password protect your private files and prevent them from being modified, read or even accessed without the correct password. With Kruptos 2 you can password protect all your sensitive personal and commercial information including your photos, movies, credit card data, tax returns or any other private document.

    Kryptel is file encryption software designed for reliable protection of sensitive data.

    KSignPKI is a system that implements the offline seal or signature on-line by using the public key cryptography algorithm and issues and manages the electronic certificate containing the digital signature value of each user

    Mailfence provides an end-to-end encrypted email solution (OpenPGP based - en(de)ryption occurs on the client side + Digital signatures) integrated in a suite with many other services such as contacts, calendar, documents, groups, polls.

    Micro Focus SecureData is an end-to-end data-centric security solution for the new data-driven economy.

    Micro Focus SecureData Payments is a secure payment solution for retail transactions designed to provide complete point-to-point encryption, tokenization and data security.

    miniLock is a simple solution for encrypting and sharing files.

    modusCloud is a cloud based email security solution designed to protect against spam, phishing, advanced targeted attacks, malicious attachments, data loss and drive by URLs.

    MX is an ultra-secure data exchange solution for businesses.

    nShield hardware security modules (HSMs) provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more.

    The ParaDoxBox encryption management platform incorporates a rich feature set of functionality for any size organization.

    payShield 9000 supports payment applications for contact chip, contactless chip and mobile secure elements. The solution addresses evolving standards from EMVCo, PCI SSC, GlobalPlatform and Multos International.

    Sbwave email encryption is a free service that encrypts text messages for email delivery.

    Shield Security Cockpit is an App developed by RevCult that automates the encryption process for Salesforce Shield Platform Encryption.

    Silent Circle is a secure communications company offering mobile devices, software applications, and communication management services.

    With SmartCryptor you can encrypt your data and store it securely on desktop or cloud storage applications. Share your files or revoke access to any shared documents anytime, using any device. You have the full control over your critical data and who can access it.

    SSH Universal Key Manager grants, automates and enables single sign-on remote access to the digital core of every Fortune 500 company.

    Manage your team's projects with tasks, documents and realtime messages in end-to-end encrypted data rooms.

    CryptoDocument Orchestrator Module has the ability to orchestrate the encryption of tens of millions of documents within a business application.

    CI Plus is a technical specification that adds additional security and enhanced capabilities to the proven Digital Video Broadcasting (DVB) Common Interface Standard. Symantec CI Plus Device Credentials, using the Managed PKI Service, is the easiest way to guarantee optimum security between the TV receiver and the content provider.

    CI Plus is a technical specification that adds additional security and enhanced capabilities to the proven Digital Video Broadcasting (DVB) Common Interface Standard. Symantec CI Plus Device Credentials, using the Managed PKI Service, is the easiest way to guarantee optimum security between the TV receiver and the content provider

    Symantec Command Line powered by PGP Technology enables organizations to quickly and easily integrate encryption into batch processes, scripts, and applications to ensure the security of corporate data at rest or in transit. Whether your challenge is protecting credit card information, financial transactions, payroll, medical records, or other confidential information, Command Line's scriptable encryption is a key part of an organization's data protection tool kit.

    Most cyber threats hide in encrypted communications up to 70 percent of all traffic. Symantec Proxy and SSL Visibility Appliance decrypt traffic, support infrastructure security to maintain privacy and data integrity.

    Protect your information in email, whether in transit or at rest. Symantec Gateway Email Encryption provides centrally managed email encryption to secure email communications with customers and partners regardless of whether or not recipients have their own email encryption software. With Gateway Email Encryption, organizations can minimize the risk of a data breach while complying with regulatory mandates for information security and privacy.

    Thales eSecurity on-premises key management solutions unify and centralize encryption key management and provide secure key storage for data storage solutions.

    Vaporstream is a security program for conversations and messaging, similar to the more familiar password security programs. It keeps conversations from being heard, forwarded, or even captured by screenshot. Encryption keeps information safe on mobile devices even if the device is stolen. Additional features can automatically delete read messages, inactive conversations, and pictures.

    The Vormetric Data Security Platform manages data-at-rest security across entire organizations.

    Vormetric Transparent Encryption enables data-at-rest encryption, privileged user access control and the collection of security intelligence logs without re-engineering applications, databases or infrastructure.

    Votiro Disarmer for file transfer disarms known and unknown file threats coming from the external network before they enter your internal network. Designated to work in a complete network separation environment, Votiro Disarmer for file transfer automates the file sharing process and sanitizes files from any zero-day threats on local or remote servers, using our patented CDR technology. The data is then replicated to the internal server for safe use.

    ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption) reduces the cost of deploying, managing, and troubleshooting encrypted laptops and desktops.

    Performance-Optimized Big Data Encryption for Hadoop, NoSQL, and Relational databases

    Learn More About Encryption Software