Software > IT Security > Encryption

Encryption Software

Encryption software is used to convert texts, audio files or images into a string of characters that cannot be read or interpreted by outsiders with the aid of certain encryption processes (cryptosystems). To make the original data visible again, the other party needs the so-called key. Different keys may be used for encryption and decryption. At this point you will find an overview of encryption software. These are programs that help you to encrypt your e-mail traffic, to sign documents with your signature or to put a copy and content protection over a document.

Are you looking for a suitable encryption software?
show 1 to 5 (of 5 software programs)
CrypToken
USB token for security solution providers
USB token for security solution providers The CrypToken® USB for security solution providers and system administrators is ideal for secure authentication in eBusiness applications and as a smart card alternative. It offers strong authentication, PKI support via CAPI / PKCS#11, email encryption, options for a digital signature and regulatory compliance. Users in the LAN/WAN can be identified. It also contains functions for an SSO login for Windows and Linux as well as customer-specific special solutions ...
CRYPTO-BOX USB
Software and data backup solution for the USB interface
Software and data backup solution for the USB interface The Crypto-Box is a hardware-based system for software licensing, software protection and digital media protection. This dongle has an integrated microprocessor with hardware-integrated AES/Rijndael encryption. The CRYPTO-BOX can be conveniently integrated into existing Windows EXE or DLL files via AutoCrypt - including encryption and debug protection.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
CellShield
IRI CellShield to encrypt sensitive data in multiple Excel® spreadsheets
IRI CellShield to encrypt sensitive data in multiple Excel® spreadsheets Security and encryption for Excel® spreadsheets: IRI CellShield EE provides comprehensive protection against data loss and data breaches. Learn how to effectively classify, search and secure your sensitive information to comply with data protection regulations.
FieldShield
IRI FieldShield® for data masking of sensitive data
IRI FieldShield® for data masking of sensitive data IRI FieldShield® is powerful and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield utilities in Eclipse are used to profile and de-identify data at rest (static data masking) and the FieldShield SDK is used to secure data in motion (dynamic data masking).
show 1 to 5 (of 5 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories