[go: up one dir, main page]

Results for: encrypt/decrypt dll

Suggested Categories:

Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (8) for "encrypt/decrypt dll"

108 Products for "encrypt/decrypt dll"

  • 1
    Xecrets Ez

    Xecrets Ez

    Axantum Software AB

    ...It allows you to encrypt, decrypt and open files for editing with single clicks or drag and drop with a clean and simple user interface. It is a fully integrated frontend to Xecrets Cli, an open source and free command line program that does all the heavy lifting with encryption, decryption and secure wiping. The command line can also be downloaded and used separately for scripting and integration into other software.
    Starting Price: €15/year
  • 2
    Investintech PDF Library SDK

    Investintech PDF Library SDK

    Investintech PDF Solutions

    ...Efficient utilization of multi-core CPUs for stream decoding and content rendering purposes achieved by closely following portable document format specification guidelines. Apply electronic signatures (with or without cryptographic security layer). PDF encryption & decryption (a password-based encryption handler). Document structure manipulation (create, delete, move, insert, extract, resize, and rotate pages).
  • 3
    DESwrap

    DESwrap

    Data Encryption Systems

    ...An ideal method of controlling demonstration software, this counter may be reset remotely. In addition to the standard features, all DESwrap system messages may be user-defined when protecting your application. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API. The number of API calls per DESkey access and the .DLL files which use ACE can be customized. DESwrap for 32-bit Windows also encrypts function calls to .DLL files and the Win32 API.
  • 4
    PDF Encrypt & Decrypt
    Protect your PDF files with passwords and prevent PDF files from being printed, changed, copied, extracted, signed, filled, assembled and/or merged. To decrypt PDF won't be difficult with this utility.
    Starting Price: $29 one-time payment
  • 5
    Fasoo Secure Email
    Allow users to send decrypted documents through email without having to remove the encryption before sending. This email-based DLP tool provides an exception for encrypted documents through an approval process so internal documents always remain encrypted. Once approved, documents are decrypted by the server prior to sending them. Decrypt documents automatically as users email them without requiring the sender to request approval to decrypt the document before sending it to a recipient. ...
  • 6
     dbForge SQL Decryptor
    dbForge SQL Decryptor is a highly functional free tool designed for decrypting database objects that were created with the WITH ENCRYPTION option. Key Features: - Connecting to multiple servers, both local and remote - Decryption of all types of objects, including stored procedures, functions, triggers, and views - Batch decryption wizard for bulk operations - Saving decrypted objects to a single T-SQL file or separate T-SQL files for each object - Decrypting objects directly on the server for further work in SSMS - Restoration of original T-SQL descriptions even if the original source file is unavailable - Support for all national characters - Search for encrypted objects and filtering them by object types - Syntax highlighting for both code and comments - No DAC (Dedicated Administrator Connection) mode required - No need for manual T-SQL coding dbForge SQL Decryptor, with its light and easy-to-operate user interface, is an essential tool for
    Starting Price: $0
  • 7
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    ...All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 8
    DriveCrypt

    DriveCrypt

    Securstar

    ...Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.
    Starting Price: $59.95
  • 9
    F5 BIG-IP SSL Orchestrator
    ...Maximize infrastructure and security investments with dynamic, policy-based decryption, encryption, and traffic steering through security inspection devices. Protect against outbound traffic dispersing malware, exfiltrating data, or reaching out to a command-and-control server to trigger attacks. Decrypt incoming encrypted traffic to ensure it’s not hiding ransomware, malware, or other threats that lead to attacks, infections, and data breaches.
  • 10
    FileMarket

    FileMarket

    FileMarket

    ...Buyers reserve funds in a smart contract, share their public key, and upon purchase receive an encrypted decryption key, downloading and decrypting the file. A backend listener and fraud‑reporting system ensures only correctly decrypted files complete a sale, and ownership transfers trigger secure key exchanges.
  • 11
    OX Guard

    OX Guard

    Open-Xchange

    ...OX Guard was designed specifically with this in mind. This PGP based security add-on for OX App Suite, integrates seamlessly into our existing email app, letting users encrypt and decrypt emails and files easily. There is a growing demand for privacy from users, while at the same time, they are concerned about increased complexity and reduced usability. OX Guard was designed to satisfy these concerns. An easy to use wizard lets users set up OX Guard quickly, with no additional security know-how. After set up users are able to encrypt and decrypt emails and files with just one click, integrating security seamlessly into day-to-day user workflows.
  • 12
    Passware Kit
    Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts.
    Starting Price: $1,195 one-time payment
  • 13
    SekurVPN

    SekurVPN

    Sekur Private Data

    ...It also can help you bypass geographic restrictions and censorship. SekurVPN software client on the user's device encrypts the device's connection request sent to the associated VPN server. Once the connection is established, requests for information are encrypted and go from the user's device to the VPN server. The VPN server decrypts the request and uses the Internet to obtain the information. Once obtained, the VPN server then encrypts and returns the information, which is decrypted by the client software.
    Starting Price: $9 per month
  • 14
    Secure My Files
    Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library.
    Starting Price: $14.99 one-time payment
  • 15
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data integrity are needed. ...
    Starting Price: $239.00/one-time/user
  • 16
    Lockystar

    Lockystar

    Lockystar

    Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive. It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible. Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.
    Starting Price: $0
  • 17
    SAV7

    SAV7

    SAV7

    SAV7 encrypts files of any type with AES-256 and generates a secure key to restore the files. Encrypted files can only be restored with the key file. This ensures that it is impossible to decrypt the files without the key file. SAV7 AES-256 Encryption employs state-of-the-art encryption technology based on the symmetric AES (Advanced Encryption Standard).
  • 18
    ZixMail

    ZixMail

    Zix Corporation

    ZixMail is the desktop email encryption solution that provides individuals with a high level of security in their email communications. It's an easy-to-use service that lets users encrypt and decrypt emails and attachments with a single click. Trusted by key figures in Government, Financial, Healthcare, and Legal fields, ZixMail is a unique Email Encryption application that differentiates itself from other solutions by focusing on both the sender and receiver experience. ...
  • 19
    PDFEncrypt

    PDFEncrypt

    PDFEncrypt

    PDFEncrypt is a free, open source utility to encrypt PDF files using standard PDF encryption algorithms. When a document is encrypted, its contents become unreadable. An authorized user can decrypt the document to obtain access to the contents. If a PDF document is encrypted with a password, the user must specify the password before the document can be viewed in Adobe Reader or Adobe Acrobat.
    Starting Price: Free
  • 20
    Hornetsecurity Email Encryption
    ...If the sender’s public key is available, their emails are automatically decrypted and delivered to the recipient. Encryption of data has become a priority because of compliance requirements. In a business environment, the exchange of sensitive files and information takes place primarily via email communication. Encryption of the transmission path is essential to protect this data.
  • 21
    NuCypher

    NuCypher

    NuCypher

    ...Fully Homomorphic Encryption (FHE) is a form of encryption that allows arbitrary, secure computation on encrypted data (meaning encrypted data can be processed without needing to decrypt it first). Operations on the encrypted data are applied as if being performed on the plaintext data.
  • 22
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. ...
  • 23
    KodeFile

    KodeFile

    1SQ Technologies

    The hardest part of encryption is dealing with the encryption keys. Until now! KodeFile's Key On Demand Encryption (KODE) generates and stores a unique key for every file you encrypt. Then on demand, shares the secret keys with your Confidants so that they can decrypt. KodeFile never possesses your files. You separately store and share the files as you see fit (email, cloud, flash drive, etc.), ensuring you are always in control of your privacy. ...
  • 24
    Solarium

    Solarium

    Solarium

    Solarium is a fully decentralised, end-to-end encrypted, censorship-resistant instant messenger based on the Solana blockchain. Solarium is currently in alpha phase, running on the Solana devnet. All messages in Solarium are end-to-end encrypted using the XChaCha20-Poly1305 symmetric encryption algorithm, using a 256-bit content encryption key (CEK) that is shared for all messages in a given channel.
  • 25
    FormatPDF

    FormatPDF

    FormatPDF

    ...The website includes tools for compressing PDF files, which can reduce the size of large documents for easier sharing and storage. Users can also encrypt PDF files with passwords to restrict access, or decrypt protected files if they have the necessary credentials.
    Starting Price: $4.90/month
  • 26
    Symantec Endpoint Encryption
    ...Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.
  • 27
    FinalCode

    FinalCode

    Digital Arts

    ...In addition, users can use it regardless of security literacy because encryption is transparent to users. We provide an executable API that allows you to call the encryption/decryption functions of "FinalCode" from internal business systems such as document management systems and workflow systems.
  • 28
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    Cypherix's SecureIT File and Folder Encryption Software is an easy to use, feature packed program that protects all your files and folders using 448-bit strong Blowfish encryption. It includes a powerful, customizable file shredder. SecureIT File Encryption Software has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the program.
    Starting Price: $29.95
  • 29
    SecuritySuite

    SecuritySuite

    Assist AI, Inc.

    SecuritySuite v3.12.4 – Clipboard Protection for Windows Stop clipboard snoopers in their tracks. SecuritySuite encrypts anything you copy, auto-clears it after 30 seconds, and gives you a safe way to paste when you actually need it. Key Features 🔒 Clipboard Encryption – copied text is scrambled so malware only sees junk ⏱ Auto-Clear Timer – clipboard wipes itself after ~30s with cover writes 📋 Decrypt & Paste – safe 5-second countdown paste at your cursor 🛑 Pause & Bypass Modes – quickly disable or allow copy/paste in trusted apps 🖱 Tray Menu + Floating Button – fast controls always at hand Why It Matters Your clipboard is a top target for malware and data harvesters. ...
    Starting Price: $15.99
  • 30
    east-tec SafeBit
    East-tec SafeBit is an on-the-fly disk encryption software that protects your confidential data by creating secure, password-protected virtual drives. These encrypted safes work like regular drives in Windows, letting you use your files normally while keeping them fully secure. The software automatically encrypts files as they’re saved and decrypts them when accessed, using strong AES 256-bit encryption to ensure data is unreadable to unauthorized users, even if your device is lost or stolen. ...
    Starting Price: $29.95
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next