Tor

3.9
(18)

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

Work for Tor?

Learning about Tor?

We can help you find the solution that fits you best.

Tor Features

Encryption

Email Encryption

Encrypts the content of emails and their attachments.

77%
(Based on 9 reviews)

Messaging Encryption

Encrypts messages being sent via text or within an application.

73%
(Based on 9 reviews)

File Transfer Encryption

Protects data with within or as it leaves your secure or local network.

84%
(Based on 10 reviews)

Data Encryption

Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.

82%
(Based on 11 reviews)

Document Encryption

Provides a level of encryption for text documents.

68%
(Based on 9 reviews)

Full-Disk Encryption

Encrypts entire device to secure data in case it is lost or stolen.

60%
(Based on 6 reviews)

Compliance

Authentication

Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging

85%
(Based on 6 reviews)

Policy Enforcement

Abilities to set standards for database security and risk management.

79%
(Based on 7 reviews)

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

91%
(Based on 5 reviews)

Management

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data available

Recovery

Decrypts datasets or files or allows users access to a backup database for reintegration.

50%
(Based on 6 reviews)

File Management

Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.

Not enough data available

Anomaly Detection

Monitors activity within networks and alerts administrators when unusual activity occurs.

61%
(Based on 5 reviews)