Last updated on: Dec 13, 2019
  • Symantec Corporation specializes as a security company and has achieved growth in the encryption software market by delivering information-centric encryption, endpoint encryption, file sharing encryption, desktop email encryption, gateway email encryption, cloud data protection and security, and command line. Symantec Endpoint Encryption helps enterprises to secure their sensitive data with the help of encryption and also facilitates in complying with government regulations. Symantec Information Centric Encryption protects sensitive data in the on-premises and cloud environments. Symantec Information Centric Encryption provides the capabilities of Symantec Data Loss Prevention and Symantec CloudSOC technologies. Symantec Information Centric Encryption provides features, such as encryption support for various file formats, cloud file storage encryption support to Box and OneDrive, and deletion of data accessed by unauthorized users. Symantec Endpoint Encryption also offers File Share Encryption, which provides automatic encryption of files stored in the cloud and endpoint environments.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Dell has advanced in the encryption software market by delivering the best-in-class encryption solutions for encrypting data-at-rest, data-in-motion, and data-in-use. The encryption solutions provided by Dell include Dell Encryption Enterprise, Dell Encryption External Media, Dell Data Guardian, and Dell BitLocker Manager. Dell Encryption Enterprise helps customers encrypt data stored in the system drive, external media, and cloud environment. The file and folder encryption capabilities from Dell support several operating systems, such as Windows, Mac, Linux and Android. Dell Encryption Enterprise offers centralized management of policies, supported with authentication modes, such as Single Sign-On (SSO) and smart cards. Dell Encryption External Media ensures that the critical enterprise data stored in the endpoint, server, and removable disk remains encrypted. Encryption is supported for a wide range of USB, removal disk, and smartphone devices. Dell Encryption External Media supports a wide range of security policies and is compatible with Microsoft Windows Server Active Directory tools.

    Read More
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • IBM Guardium doesn't require any coding or modification to applications or databases and it secures both structured and unstructured data. The solution scales and adapts for large and complex environments. It also delivers extensible protection to log files, configuration files and other database output. It facilitates Live data transformation, which allows businesses to encrypt data without needing their applications to remain offline, speed the data protection process while also supporting business continuity and efficiency.

    Read More
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • McAfee is an expert  in network security, endpoint security, database security, data protection and encryption, threat protection, server security, web security, and SIEM. The company enhanced its data protection and encryption portfolio by offering three products: McAfee Complete Data Protection, McAfee Complete Data Protection–Advanced, and McAfee Total Protection for DLP. McAfee Complete Data Protection delivers endpoint data encryption and protection solution that is managed by a single centralized console. It is supported by McAfee ePolicy Orchestrator (McAfee ePO), which efficiently manages Apple FileVault on Mac OS X and Microsoft BitLocker on Windows. Some of the significant features of McAfee Complete Data Protection are drive encryption, file encryption, native encryption management, automated encryption, advanced identification and verification of users with multifactor authentication, Intel Software Guard extensions support, and compatibility with major credential providers. The solution’s native encryption management functionality ensures the encryption functionality is available in Apple FileVault on Mac OS X, and Microsoft BitLocker on Windows can be leveraged by McAfee ePO.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • Trend Micro has progressed in the encryption software market by offering best-in-class data encryption, email encryption, and cloud encryption solutions. Its on-premises encryption portfolio covers encryption for disks, files, and folders available at the endpoints. The company provides encryption for a mixed environment and also supports self-encrypting drives which are based on technologies from Seagate, TCG OPAL, and OPAL 2. The features supported by Trend Micro Endpoint Encryption are centralized policy and key management, FIPS 140 encryption certification, AES 256-bit encryption, file and folder encryption, removable media encryption, granular port and device control, selfencrypting drive management, full disk encryption, and network aware pre-boot authentication. The company is also proficient in offering Email Encryption solution which efficiently supports client email, server email, and hosted email encryption at the lowest TCO with minimal maintenance key management.

    Read More
    • Enterprise
    • Tokyo, Japan
    • Founded: 1988
    • $1BN to $5BN
    • 5,001 to 10,000
  • Sophos is a cybersecurity company that offers solutions and services for endpoint security, network security, web security, email security, and cloud security. The company provides Sophos SafeGuard Encryption which encrypts the file at the time of creation and prevents unauthorized users from accessing the encrypted data. The company's encryption solutions are capable of encrypting data in the endpoint, cloud, and mobile environments. The company also delivers file encryption, full-disk encryption, real-time threat protection, and DLP. Sophos SafeGuard Encryption also helps companies in compliance, reporting, and management by providing detailed reports and audits, role-based management to distinguish authorization levels, secure key management, and efficient centralized policy management of groups and devices. Sophos provides three types of licenses, which include different security modules.

    Read More
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • PkWare's Smartcrypt platform is supported by a Smartcrypt Enterprise Manager which provides enterprises with complete control over their critical data. Smartcrypt Enterprise Manager helps administrators in the enforcement and alignment of encryption policies and management of Smartcrypt agents. Some of the key features of Smartcrypt Enterprise Manager are enhanced encryption key management, simpler key distribution and exchange, enhanced policy management, and data security intelligence. Smartcrypt Enterprise Manager is a virtual appliance or hardware appliance which is integrated with hardware security module and a quantum random number generator. Also, PkWare applies Persistent Encryption directly to the data itself, rather than to a storage location or transmission system.

    Read More
    • Enterprise
    • 501 to 1,000
  • Microsoft Corporation provides business cloud services and solutions that efficiently encrypt data residing in the enterprise network. The company uses secure transfer protocols to safely move data between the data centers and endpoints. Microsoft BitLocker provides inbuilt encryption for dataat- rest and data-in-transit, and relies on the Microsoft Public Key Infrastructure for the authentication of users and endpoints. Microsoft BitLocker uses Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPsec), AES, Microsoft Azure Storage Service Encryption, and Transparent Data Encryption. TLS/SSL is utilized by Microsoft BitLocker solutions for encrypting data-in-transit. IPsec ensures that confidentiality, integrity, and availability of data are maintained at the IP packet level. Microsoft provides AES-based encryption for files and folders stored in the Hyper-V virtual machine. Microsoft Azure Storage Service Encryption has various features for encrypting data stored in the Azure Blob storage. Microsoft also offers IaaS virtual machine disk encryption with the help of BitLocker for the Windows OS and DM-Crypt feature for the Linux OS. The company is also focused on database encryption. Azure SQL database data is encrypted with the help of Transparent Data Encryption (TDE). Apart from disk and database encryption, Microsoft BitLocker is also focused on encryption key management for cloud and on-premises services.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1975
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • Netskope has the ability to act as a key broker between the on-premises KMS and cloud service. The company has the potential to apply strong encryption selectively to the organization's sensitive data across all of their cloud services. Netskope provides the industry’s most well defined cloud DLP that allows businesses to secure their sensitive data wherever it goes. The company also helps businesses to manage the complexity in meeting compliance requirements from GDPR to PCI-DSS without interrupting productivity and cost.

    Read More
    • Enterprise
    • 501 to 1,000
  • Skyhigh Networks helps businesses by providing Structured Data Encryption, that secures sensitive structured data with function-preserving encryption schemes making use of enterprise-controlled keys. The company recognizes and encrypts existing data found in cloud services. The solution stores end-user functions such as search, sort, and format by using academia and peer-reviewed encryption schemes.

    Read More
    • Enterprise
    • 501 to 1,000
  • The company provides robust inline protection through cloud gateways that support cloud data encryption and tokenization. CipherCloud uses AES 256-bit encryption, NIST-approved key management, and FIPS 140-2 certified validation. CipherCloud’s active encryption technology provides endto- end encryption of cloud data, enhanced control of keys, policy controls, format and function preserving technology, and high scalability with low latency. The company offers a cloud encryption platform for data-at-rest and data-intransit in the on-premises and cloud environments. The preserving cloud functionality is one of the unique features of its CASB platform which enables customers to use the search capability for encrypted data.

    Read More
    • Enterprise
    • 501 to 1,000
  • The Certes Layer 4 solution is simple and fully scalable. It has the ability to support multiple sites where ever servers are deployed without interrupting the performance or the speed that data is transferred. Certes Layer 4 solution, consistently maintains network visibility while securing the data in transit. CryptoFlow Net Creator (CFNC) is FIPS 140-2 as well as Common Criteria validated, which prove to be critical for businesses with comply with data protection regulations. CFNC is also capable of providing support encryption at any network layer, it also provides security management and protection for Layer 2, Layer 3 and Layer 4 networks.

    Read More
    • Enterprise
    • 501 to 1,000
  • ESET specializes in endpoint security, server security, and remote management. The company’s endpoint security portfolio includes products such as endpoint protection, data encryption, mobile and table protection, and two-factor authentication. ESET offers encryption for hard disks, removable media, files, and emails. The company’s data encryption portfolio is handled by its subsidiary, DESlock and is based on the FIPS 140-2 validated 256-bit AES encryption. The company offers encryption for both client and server sides. The client side uses the MSI package for security and compliance management. The server side takes care of management and encryption enforcement on workstations from remote locations.

    Read More
    • Enterprise
    • 501 to 1,000
  • Protegrity is the only data security software platform vendor that uses fully scalable, data-centric encryption to enable organizations to protect sensitive data. The Protegrity Data Security Platform delivers enterprise-grade data security that is preferred across applications, data warehouses, mainframes, big data, and cloud environments. Protegrity Prime provides complete data privacy protection and makes regulatory compliance easier. The company charges no extra cost when the platforms are expanded or upgraded and to protect new additional technology platforms.

    Read More
    • Enterprise
    • 501 to 1,000
  • Communication Security Group provides two platforms Cellcrypt and Seecrypt, that operate seamlessly across iOS, Android, Blackberry, and PBX systems. They are ideal for any organization regardless of their size. The company also offers government-grade encryption levels for businesses that require most stringent security with flexible pricing for smaller enterprises. Cellcrypt and Seecrypt have the ability to function in a carrier-agnostic manner from 2G Edge to 5G, since they require ultra-low bandwidth. The company also helps users in securing their voice and conference calls, messages and attachments by implementing end-to-end encryption used by governments across the globe.

    Read More
    • Enterprise
    • 501 to 1,000

Encryption Software Quadrant

Comparing 37 vendors in Encryption Software across 128 criteria.

Find the best Encryption Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Encryption Software tools.
  • Support and Services
    • Channel for Delivery of Support Services
      • On-Site Support
      • Remote Support
  • Services
    • Services
      • Professional Services
      • Managed Services
    • Professional Services
      • Support and Maintenance
      • Consulting Service
      • Training and education
  • Focus on Product Innovation
    • Type of Algorithm
      • AES
      • Others (RSA, Blowfish, DES)
    • Support and Services
      • Data Encryption
      • Data Loss Prevention
      • Tokenization
      • Key Management
    • Solutions Offered
      • Disk Encryption
      • File/Folder Encryption
      • Database and Application Encryption
      • Communication Encryption (Voice email, and message)
      • Cloud Encryption
    • Deployment Model
      • SaaS
      • PaaS
      • IaaS
    • Applications Catered
      • Data-in-motion encryption
      • Data-at-rest encryption
      • Data-in- process/use encryption
      • Virtual machine instance encryption
      • File level encryption
      • Application-level encryption
      • Column-level encryption
  • Delivery
    • End Users
      • Large Enterprises
      • SMEs
    • Deployment Model
      • On-Premise
      • Cloud
    • Channel of Delivery
      • Directly
      • Through Partners / Third-Party Vendors

TOP REVIEWS

Looking for Encryption Software? Get help
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
#0 in Encryption Software

“Simple, Secured, Collaborative"

(*)(*)(*)(*)(*)5
I could only say after the use is Marvel! It infused a transitional shift in our business. Its intuitive platform has helped us to manage versions and keys of our business effectively and efficiently. Apart from this, it has a collaborative technology.
Global Head - Service and Product Development,Company Name Classified
Global Head - Service and Product Development, Company Name Classified
#0 in Encryption Software

“Enterprise Ready"

(*)(*)(*)(*)(*)5
The best thing that I loved about CrytoMove’s encryption software is that it''s ready to use. The platform is reliable and safe and has undoubtedly supported our business in all possible ways. Its cloud-native solution is just spectacular.
...

Marie Stelle

Engagement Partner - 360Quadrants.com