[go: up one dir, main page]

Results for: portable encrypt

Suggested Categories:

Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Digital Wayfinding Software
Digital wayfinding software enables businesses to create and display digital tours and maps to their customers and visitors. Digital wayfinding solutions can be displayed on mobile apps, kiosks, websites, and more.
View more categories (8) for "portable encrypt"

20 Products for "portable encrypt"

  • 1
    EncryptUSB

    EncryptUSB

    ClevX, LLC

    EncryptUSB™ (by ClevX®) is an automatic encryption tool – a portable software application that protects information on the USB drive. Designed to run without installation on a host computer, EncryptUSB operates from the portable drive itself, encrypting every file placed on the drive. Developed with security and compliance in mind for users who transfer sensitive personal information and documents via USB drives, EncryptUSB ensures that the files you put on your drive are encrypted and password protected.
    Starting Price: $9.96/year
  • 2
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.
  • 3
    Portabl

    Portabl

    Portabl

    ...Validate and verify information with an added layer of security by using zero-knowledge proofs (ZKPs) in place of explicit data. Use globally-recognized standards (OIDC SIOP) to let your users log in with their verified identity over an encrypted channel, eliminating the password risk. Access changes in your customer data as they happen, supported by a tamper-resistant audit ledger.
  • 4
    Steganos Data Safe
    Steganos Data Safe is a secure, future-oriented digital vault that lets users create encrypted safes in minutes and store all kinds of sensitive files with strong, state-of-the-art 256-bit AES-GCM encryption accelerated via AES-NI. Safes automatically scale in size without wasting space, can be synchronized with cloud services (auto-detecting Dropbox, Microsoft OneDrive, Google Drive, and any other cloud), and support shared network safes that allow simultaneous write access by multiple users. ...
    Starting Price: $29.95 per month
  • 5
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. ...
    Starting Price: $28 per device per year
  • 6
    KakaSoft USB Security
    ...Enjoy protection anytime and anyplace without installation. Lock and unlock USB drives on any computer without installation. USB Disk Security well protects your sensitive information in USB drives with the strongest encryption technique. Lock, encrypt, password password-protect USB flash drives, thumb drives, pen drives, memory sticks, and other portable storage devices. This USB disk security program ensures comprehensive data security of your confidential data on your USB flash drives. Ensure data security in USB flash drives with multiple layers of protection and advanced encryption techniques. ...
    Starting Price: $14.95 per month
  • 7
    CopySafe

    CopySafe

    ArtistScope

    CopySafe Web Protection provides the most secure image protection imaginable. CopySafe Web encrypted images cannot be saved, downloaded, copied or captured. Nor can the encrypted images stored on the server be used anywhere else except for display on the owner's web pages. By simply adding a small encrypted to any web page, copy protection is activated for the whole page, protecting all media from PrintScreen and screen capture.
  • 8
    MicroSIP

    MicroSIP

    MicroSIP

    ...Written in C and C++ with minimal system resources usage. User friendly in daily usage. WebRTC echo cancellation algorithm and voice activity detection. Configurable encryption TLS / SRTP for control and media. It has no additional dependencies and stores setting in ini file. Multilanguage and RTL support, localization for Brazilian, Bulgarian, Chinese, Dutch, Estonian, Finnish, French, German, Hebrew, Hungarian, Italian, Korean, Norwegian, Polish, Russian (микросип), Spanish, Swedish, etc. can be used by people with visual impairments using screen reader software such as NVDA.
  • 9
    Investintech PDF Library SDK

    Investintech PDF Library SDK

    Investintech PDF Solutions

    ...Numerous interface functions for transforming and creating new content for PDF files, providing a huge variety of options and broad flexibility for implementation tailored to the specific needs of your project. Efficient utilization of multi-core CPUs for stream decoding and content rendering purposes achieved by closely following portable document format specification guidelines. Apply electronic signatures (with or without cryptographic security layer). PDF encryption & decryption (a password-based encryption handler). Document structure manipulation (create, delete, move, insert, extract, resize, and rotate pages).
  • 10
    P2P Telehealth
    Easy, Compliant & Secure Telehealth Video consultations that are: Easy. Works on your phone or computer browser. No software to install. Compliant. Enables you to comply with HIPAA. Secure. Connects peer-to-peer with end-to-end encryption. Easy to stay compliant. Custom-built for compliance with HIPAA unlike some others. HIPAA stands for the "Health Insurance Portability and Accountability Act of 1996". It's a US federal mandate that requires the protection and confidential handling of "protected health information". P2P Telehealth can help you comply with its HIPAA obligations. ...
  • 11
    Multi One Password

    Multi One Password

    Windows Portable Apps

    Multi One Password is a password manager that allows multiple random passwords to be generated with one unique password. Almost all password managers available out there are not really password managers, they are Note managers, because they store passwords in encrypted vaults either stored locally in users devices or in the cloud. Multi One Password is different, it is a real password manager because it does not store passwords neither locally in the users devices nor in the cloud,...
    Starting Price: $10 Activation Code
  • 12
    Endpoint Protector
    ...The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 13
    MangoWriter

    MangoWriter

    MangoWriter

    MangoWriter is a secure text editor for Windows designed to run completely offline with no cloud, AI, network connections, or telemetry, offering a familiar, simple editing experience while keeping content private by default. It uses state-of-the-art AES-256-GCM encryption with strong key derivation (Argon2id) and optional keyfile two-factor support, ensuring no plaintext is ever written to disk and eliminating caches or temp files. MangoWriter protects your work with a secure clipboard that binds copied content to the current session, an instant lock screen to mask content when stepping away, and one-click bulk redaction tools to permanently black out selected text across documents. ...
  • 14
    Peer Mountain

    Peer Mountain

    Peer Mountain

    ...It is an end-to-end application ecosystem that facilitates secure commerce and exchange of digital and physical services. Gain assurance of reliable and secure independent audits and claim verification. Only share and validate encrypted data according to transaction requirements. Segment services across Peer Mountain deployments securely and transparently. Control your data in a distributed system that makes hacking unfeasible. Peer Mountain serves consumers who want self-sovereign identity, service providers who need continuous, reliable compliance, and trust providers offering validation services who need trust interoperability and portability.
  • 15
    NetSfere

    NetSfere

    Infinite Convergence

    NetSfere is the leading enterprise mobile messaging service that provides all preferred means of communication - text, video, and voice - all in one encrypted platform. NetSfere provides industry-leading security and message delivery capabilities, including global cloud-based service availability, device-to-device encryption, location-based features and administrative controls. NetSfere is also compliant with regulatory requirements, including the Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), Sarbanes-Oxley and others. ...
    Starting Price: $7 per user per month
  • 16
    Perl

    Perl

    Perl

    ...Perl includes powerful tools for processing text that make it ideal for working with HTML, XML, and all other mark-up and natural languages. Perl can handle encrypted Web data, including e-commerce transactions.
    Starting Price: Free
  • 17
    CAM UnZip

    CAM UnZip

    CAM UnZip

    ...The command-line interface exposes all features and options so you can call it from batch files and other programs with complete control of the zipping/unzipping process. Portable install option to run from a USB Drive, DropBox, Google Drive, etc. without any changes to your system. Encrypted password-protected ZIP file support. Command-line support for using the send to menu. You may use CAM UnZip for your own personal use free of charge. ZIP files can be created so that they require a password in order to be extracted. ...
    Starting Price: Free
  • 18
    PeaZip

    PeaZip

    PeaZip

    ...PeaZip is free, based on open source technologies of 7-Zip/p7zip archiver, Facebook Zstandard fast compressor, FreeArc, Google Brotli fast compressor, PAQ family of compressors, secure file archiving and encryption PEA project, and other free software file compression tools. Cross-platform and cross-architecture, same full-featured GUI application on Linux, macOS, and Windows, providing full-featured file manager and archive manager on all platforms, also available as a portable application. Supports over 200 archive formats, ranging from very powerful compressors like 7Z and ZPAQ to extremely fast compressors like Brotli and Zstandard, with the option to easily convert archives.
    Starting Price: Free
  • 19
    FPT Cloud

    FPT Cloud

    FPT Cloud

    ...Its offerings include scalable virtual servers with auto‑scaling and 99.99% uptime; GPU‑accelerated infrastructure tailored for AI/ML workloads; FPT AI Factory, a comprehensive AI lifecycle suite powered by NVIDIA supercomputing (including infrastructure, model pre‑training, fine‑tuning, model serving, AI notebooks, and data hubs); high‑performance object and block storage with S3 compatibility and encryption; Kubernetes Engine for managed container orchestration with cross‑cloud portability; managed database services across SQL and NoSQL engines; multi‑layered security with next‑gen firewalls and WAFs; centralized monitoring and activity logging.
  • 20
    YNQ

    YNQ

    Visuality Systems

    ...YNQ supports full compatibility across all SMB dialects (from NTLM 0.12 through SMB 3.1.1), including backward compatibility, making it broadly applicable across SMB ecosystems. It offers security features such as Kerberos (domain-join, delegation), NTLM/NTLMv2, message signing, SMB encryption, and pre-authentication integrity. YNQ is modular and comprises four product components; Standalone Client, Corporate Client (with Active Directory registration capability), Standalone Server, and Corporate Server.
  • Previous
  • You're on page 1
  • Next