[go: up one dir, main page]

Results for: encrypt/decrypt dll - Page 3

Suggested Categories:

Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
View more categories (7) for "encrypt/decrypt dll"

108 Products for "encrypt/decrypt dll"

  • 1
    DropSecure

    DropSecure

    DropSecure

    ...With end-to-end encryption, encrypted uploads, decrypted downloads, two-factor authentication, cryptographic keys, and zero knowledge transfers, we offer the ultimate technology to keep your data safe from the data centers. So whether you are an individual, business or enterprise, you are always aware of who has access to your sensitive documents. Most importantly, no one owns the keys to your documents apart from you, not even us.
    Starting Price: $10 per month
  • 2
    Portabella

    Portabella

    Portabella

    ...No personal or third party data tracking. Portabella contains no third party tracking scripts or pixels. Your movements and actions are never mined for insights, you are not the product. End-to-end encrypted. Your data is safe and sound via a combination of AES and ECIES encryption. All cryptographic operations happen in your browser so no one except you or your team can see your data . Shareable. When you need privacy and encryption are at the forefront of Portabella, but sometimes you want to show off your work to the world. Easily decrypt and set your project as public for the world to see . ...
    Starting Price: $9.99 per user, per month
  • 3
    Magnum Wallet

    Magnum Wallet

    Magnum Wallet

    ...Users must enter the passphrase to decrypt the backup. We cannot recover your backup file or private key if you lose or forget the passphrase.
  • 4
    Stackfield

    Stackfield

    Stackfield

    ...Work together on documents and make the knowledge of your team centrally and conveniently available. All files of a department or a project can be centrally stored and easily found. The data are encrypted directly in the browser and are also stored encrypted on our servers. Only your team can decrypt this data, nobody else. Stackfield is the secure alternative to tools from EU third countries, such as USA. Within the team chat you can quickly exchange information with other members. It keeps the team posted about all news and it provides a central location for members.
    Starting Price: $24 per month
  • 5
    Validian Protect
    ...Seamlessly securing data in use, in memory, in databases, at rest, in transit and against interception by untrusted operating systems is a major breakthrough in cyber security. Dynamically rotating symmetrical keys for encrypting and decrypting data in memory, in databases, in storage, in transit and against interception by untrusted operating systems make Validian Protect unique with new industry-shaping features in data protection. Our peer-to-peer security encrypts decentralized data in transit from point to point while securing transitions to secure data at rest and secure data in use.
  • 6
    SSProtect

    SSProtect

    Definitive Data Security

    ...The :Foundation Client coordinates user-driven activity, dispatching secure requests to KODiAC Cloud Services while handling end-user application workflow integration. Decryption, re-encryption, authentication – never concern yourself with manual activities, the :foundation Client makes encryption both practical and easy. Access the list of managed items, viewing enumerated Version Instances and/ or your Managed Data Archive. Restore content, acquire and review Usage Reports, and even protect large data sets – all from the same set of User Interface controls available to every User independent from the Role they play in an organization.
  • 7
    PDFCool Studio
    ...Save $99! "Any to Any Converter Online" can convert PDF to word, PDF to JPG, docx to PDF and other hundreds of formats online. It supports PDF page editing, encryption, decryption, combining(merging), splitting, it also supports OCR and photo processing online.
    Starting Price: $9.95 one-time payment
  • 8
    SafePass

    SafePass

    Reason Cybersecurity

    ...It can generate new strong passwords with one click and share them with family members in a secure space. SafePass will remember your password so you don’t have to. A master password unlocks your private key, which decrypts your data in SafePass. An AES-256 symmetric encryption algorithm is used to lock down sensitive data with a new random key every time. An RSA-4096 asymmetric encryption algorithm enables SafePass to secure your data with a public key and unlock it with a private key that only you have.
  • 9
    pdfRest API Toolkit Self-Hosted
    ...Watermark PDF, Add to PDF, Query PDF, Convert to PDF, PDF to Images, Convert PDF Colors, Convert to PDF/A, Convert to PDF/X, Compress PDF, Linearize PDF, Flatten Annotations, Flatten Layers, Flatten Transparencies, Merge PDFs, Split PDF, Encrypt PDF, Decrypt PDF, Restrict PDF, Extract Text, OCR PDF, Upload Files, Zip Files. Maintain full control with a dedicated EC2-based RESTful API with scalable performance to meet your needs. Built with Adobe PDF Library, the same technology that powers Adobe Acrobat, and developed by Datalogics, globally-trusted document processing experts for over 50 years, pdfRest has the gold-standard API Toolkit for high-quality PDF processing.
    Starting Price: $0.242 per hour
  • 10
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption.
  • 11
    AnySecura

    AnySecura

    AnySecura

    ...By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. ...
    Starting Price: $216/month
  • 12
    Dropvault

    Dropvault

    Apptimi

    ...We let you, your team and your customers share sensitive documents, collaborate, comment, add tasks and reminders in complete privacy. Everything you, your team or your customers share on DropVault is encrypted and secured so your data is protected. Encryption can be difficult to use and you worry about losing or sharing the key. DropVault takes care of these problems with a great, easy-to-use app that just requires a team member or customer to enter their password. We then retrieve the key and decrypt your documents and messages. We also give you the option to add ever better security, add in trusted (or blocked) locations, enable two factor authentication on any account, require strong passwords and much more. ...
    Starting Price: $10 per month
  • 13
    DAtAnchor

    DAtAnchor

    DAtAnchor

    ...Anchored files remain secure, access controlled, and auditable even after they've left your network. All without changing how users work. Sensitive data? Anchor it™. DAtAnchor Platform in a nutshell. Agents On Windows, iOS and Android. Provides Transparent Encryption with no change in existing workflows. Contextual Access & Dynamic Revocation. Monitors User Actions. SDKs On linux, macOS, iOS, Android & Raspberry Pi. Simple to integrate APIs. Functions to encrypt/decrypt any type of data. Integrates with AWS Lambda. Third-Party Sharing One-Click sharable link. Web based View, Edit and Download. ...
  • 14
    Matrix

    Matrix

    The Matrix.org Foundation

    ...Matrix is an open source project that publishes the Matrix open standard for secure, decentralized, real-time communication, and its Apache licensed reference implementations. Matrix gives you simple HTTP APIs and SDKs (iOS, Android, Web) to create chatrooms, direct chats and chat bots, complete with end-to-end encryption, file transfer, synchronized conversation history, formatted messages, read receipts and more. Matrix provides state-of-the-art end-to-end-encryption via the Olm and Megolm cryptographic ratchets. This ensures that only the intended recipients can ever decrypt your messages, while warning if any unexpected devices are added to the conversation. ...
  • 15
    PrivadoVPN

    PrivadoVPN

    PrivadoVPN

    ...Access geographically restricted content, including on streaming services like Netflix or video services like YouTube, by virtually placing yourself in the correct region. All data sent through your VPN is encrypted at the point of origin, sent through an encrypted tunnel, and only decrypted when it arrives at the intended destination. This protects your data while in transit. Your internet service provider (ISP) may be keeping track of all your online activity, but PrivadoVPN keeps no logs of what you do online and can effectively prevent your ISP from doing the same.
  • 16
    CertiNext

    CertiNext

    eMudhra

    A Certificate Lifecycle Management (CLM) with built-in Key Management. Generate and Rotate Keys Seamlessly. Encrypt & Decrypt Data Securely. CertiNext supports all AES, RSA and ECDSA keys for your key management needs to ensure that your keys, and hence, your data remains protected, always. CertiNext Key Management comes with KMIP support to help you automate key management straight from CertiNext and ensure your ecosystem is always secure.
  • 17
    NETePay Hosted

    NETePay Hosted

    Datacap Systems

    ...Real-time reporting is available 24/7 for Datacap partners and their merchants. Remotely configure settings, pad flows, key injection, and more. Processor-proprietary Encryption methods ensure that card data is encrypted at the sale and decrypted at the NETePay Hosted without additional hops. Reduce card-present fraud with contact and contactless EMV (chip card) certifications for fixed, and mobile devices.
    Starting Price: Free
  • 18
    MiXplorer Silver

    MiXplorer Silver

    Hootan Parsa

    ...Unlimited Tabbed browsing and Dual panel in landscape mode and Drag and Drop between panels also supported. Export/Import all preferences and bookmarks and customized skins. File encryption and decryption using Aescrypt file format. User and System app management with data backup ability for rooted devices.
    Starting Price: $5.91 one-time payment
  • 19
    DataNumen SQL Recovery
    ...Recover stored procedures, scalar functions, inline table-valued functions, and multistatement table-valued functions. Recover SQL database objects, including views, triggers, rules, and defaults. Recover the schema/structure and data in the tables. Recover and decrypt encrypted objects in SQL Server databases.
    Starting Price: $499.95 one-time payment
  • 20
    signer.digital

    signer.digital

    Chartered Information Systems

    ...With signer.digital Browser Extension we offer seamless PKI operations through all the modern Browsers like Chrome, Edge and Firefox on all 3 OS platforms. Users can perform PKI Operations like Signing, Encryption, Verification, Authentication, Download of Digital Certificate Etc.
    Starting Price: $1
  • 21
    Cisdem PDFMaster
    Cisdem PDFMaster is an all-in-one PDF solution which provides powerful tools for editing, annotating, filling forms, converting, creating, merging, splitting, compressing, and encrypting PDFs. Users can edit text and images in PDFs as easily as in Word. The software also integrates AI features for summarizing content, translating PDFs, ensuring grammar and spelling accuracy, and rewriting text to improve clarity and coherence. It streamlines document management with an intuitive interface...
    Starting Price: $49.99 Annual Plan
  • 22
    Space

    Space

    Space

    What you store on Space is not siloed in our platform. You own and control your space, and can access it via other interfaces if you wish. All files, transfers, and interactions in Space are end-to-end-encrypted, and only users have control of the decryption keys. Anyone can review our code and verify our privacy and security claims, and developers can openly build on top of our Open Web stack. Store files online in a Space only you can control and access. The keys to your files and account are in your hands only, not ours, and all files are automatically backed to Filecoin, as a decentralized layer. ...
    Starting Price: $11 per month
  • 23
    QRClip

    QRClip

    QRClip

    QRClip encrypts your data using a private key created on your device. This key is never shared with us, so only you and the people you want can decrypt the data. To further increase security, you can set a time and download limit. Share files and text with any device near you using QR codes without having to send an email or message. You can also share data using standard links that you can send as desired.
  • 24
    Halcyon.ai

    Halcyon.ai

    Halcyon

    Threats like ransomware are designed to evade modern security tools, and just one miss can have a catastrophic impact on your organization. Halcyon is the first anti-ransomware and cyber resilience platform with automated encryption key capture and autonomous decryption capabilities to keep your operations running 24/7/365. Most security vendors are quick to update their solutions once a threat is seen in the real world. Without a dedicated anti-ransomware engine, the protection gap can range from 24 hours to several days or even weeks. Traditional rules-based EDR and other endpoint protection products rely on convolutional neural network AI models for detection that are generally too complex to quickly train on emerging threats.
  • 25
    Fortress

    Fortress

    Fortress Labs

    ...The Integrity Environment offers a robust, agent-less snapshotting mechanism, which dynamically captures client-specific control system configurations, coupled with malware scanning and encryption/decryption engines that ensure the integrity and confidentiality of system backups. The execution environment contains specialized tools for actually running secondary copies of industrial control system applications within purpose-built, hardened virtual machines, “hydrated” by configuration data from the integrity environment. ...
  • 26
    HR Chronicle

    HR Chronicle

    MIVB Information Technology

    Fully automated HR and Payroll processes with HR Chronicle, help you spend time on the business rather than on paper work. We encrypt and decrypt the data on the fly, when you need it, so only you can access it. You are responsible for taking timely backups and planning for disaster recovery and planning. You are in total control how users will access the solution externally and internally. We will then run 2 process runs for HR and Payroll tasks, to verify the accuracy, against your existing records. ...
  • 27
    Revoke

    Revoke

    Revoke

    We take your – and your customer’s – security very seriously, and go to great lengths to ensure privacy principles are maintained at all times. Communications are secured using advanced military grade encryption, ensuring that data remains inaccessible and unreadable by anybody except the intended recipient. As decryption of personal data can only occur through the secure key held on your customer’s mobile phone, the only person who will see any personal data you return, will be that customer. White-label data protection app for your customers. ...
  • 28
    CryptoDefender

    CryptoDefender

    BlockSafe Technologies

    Prevents malware from spying on what you type. The keystrokes are secured between the kernel and the wallet application using military grade encryption. Now, the password you enter to logon or decrypt your secret key is safe. Prevents malware from monitoring the clipboard to spy on, copy and paste the contents of the clipboard. So the destination address to which a crypto transaction is sent to is not modified. Prevents screen-scraping malware from taking screenshots of information surreptitiously. ...
    Starting Price: $5.99 per 2 devices per month
  • 29
    LLIMAGER

    LLIMAGER

    e-Forensics Inc

    ...FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical Support
    Starting Price: $425
  • 30
    AccuKnox

    AccuKnox

    AccuKnox

    ...AccuKnox runtime Security helps you discover the application Behavior of the workloads running in a public cloud, private cloud, or on-prem in VM/BareMetal or local Kubernetes orchestrated cluster or unorchestrated pure-containerized cluster. If any ransomware attacker tries to compromise the security of the pod and gets access to the vault pod, they can do a command injection and encrypt the secrets stored in the volume mount points. Then the organizations have to pay millions of dollars to get back their secrets decrypted.
    Starting Price: $999 per month