Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (3)
  • (1)
  • (2)
Deployment
  • (8)
  • (7)
  • (28)
  • (8)
  • (9)
Customer Types
  • (4)
  • (3)
  • (25)
  • (28)
  • (23)
Pricing Model
  • (8)
  • (8)
  • (3)
  • (12)
  • (22)
Integrated With
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 29 Products

Top 5 IronKey EMS Alternatives

Keybase logo
End-to-end encryption for things that matter 3.9 Based on 19 Ratings
Visit Website + Add to Compare

What is Keybase and how does it work?

Keybase is secure messaging and file-sharing. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption.

Read more

Keybase Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Skyflow Fintech Data Privacy Vault logo
Accelerate your product development with this Privacy Vault Write a Review
Visit Website + Add to Compare

What is Skyflow Fintech Data Privacy Vault and how does it work?

Skyflow Fintech Data Privacy Vault is encryption software that helps companies build products faster while maintaining data privacy, security, and compliance. Without keeping any sensitive data, it may securely interface with third-party services and workflows. It's also a low-cost data privacy vault tailored to financial use cases. It's simple to set up, infinitely configurable, and ready to assist you to tackle your use cases without exposing sensitive information. Using API interfaces with renowned payment processors, you can safely process credit card data, reducing your PCI compliance burden and bolstering your security. Instead of being "locked-in" with a single payment processor, you may optimise payment processing across numerous processors using your PCI data saved in Skyflow. You can create cards without having to deal with any sensitive information. Customer PII is recorded directly in your vault and securely transferred to any card issuance platform via secure connections. The card data is securely stored in your vault and made available to your customers using Skyflow SDKs. PCI compliance does not apply to your front-end. You also gain extra options for managing customer data, onboarding, and money transfers.

Read more
Visit Website
ESET Endpoint Encryption logo
Identity and data protection Write a Review
Visit Website + Add to Compare

What is ESET Endpoint Encryption and how does it work?

Seamless and fully validated encryption and two-factor authentication are solutions to ensure an organization's data is protected in accordance with compliance requirements. Minimize risks of business continuity disruptions and ensure the organization and the data are protected anywhere and anytime. Whether encryption or authentication, both solutions are tailored to keep setup time to the absolute minimum.

Read more

ESET Endpoint Encryption Pricing

  • Free Trial Available
  • Starts at $56.15. Offers Custom plan.
Visit Website
oneSafe logo
Fort Knox in your Pocket Write a Review
Visit Website + Add to Compare

What is oneSafe and how does it work?

oneSafe provides advanced security, the best user interface & rich features for your passwords: seamless sync using Dropbox and iCloud, password generator, auto-lock. It's Fort Knox in your pocket!

oneSafe Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.
Visit Website
IBM Security Guardium Data Encryption logo
Keep your database and files protected from misuse 4.1 Based on 52 Ratings
Visit Website + Add to Compare

What is IBM Security Guardium Data Encryption and how does it work?

IBM Security Guardium Data Encryption is an advanced protection suite for important files and databases. The software comprises an integrated suite of products built on a shared infrastructure and achieves different capabilities such as data access, tokenization, audit logging, data masking, key management, and more. It also enables users to meet various rules and regulations, including CCPA, HIPPA, and GDPR. IBM Security Guardium Data Encryption further provides its users with centralized access controls and key management features for different encryption environments. It helps users to simplify the operations and reduce costs. The software enables data protection across hybrid multi-cloud environments, ensuring top level data security irrespective of their location. Business owners can use IBM Security Guardium Data Encryption for multiple purposes, like encrypting databases, containers, files, and applications. Businesses can encrypt key storage and manage different users’ access policies with the same. Moreover, the software also comes equipped with a cloud key orchestration facility.

Read more
Visit Website

Products Similar to IronKey EMS

Ubiq logo
Encryption made simple for developers. 4.5 Based on 2 Ratings
Visit Website + Add to Compare

What is Ubiq and how does it work?

Their mission is to enable developers to easily and quickly integrate encryption directly into their applications - without requiring any prior encryption knowledge or expertise. Removing the barriers to encryption enables broader adoption, saves developer time, and eliminates downstream security costs, allowing organizations to reduce risk and focus their time and resources on growing their business.

Read more

Ubiq Pricing

  • Free Trial Available
  • Starts at $0.01. Offers Free-forever and Custom plan.
Visit Website
Biocoded logo
Insecure is not an option 5 Based on 8 Ratings
Visit Website + Add to Compare

What is Biocoded and how does it work?

Biocoded is a secure communication and file storage software with end-to-end encryption which can be used both on the cloud or install on-premises. Its security protocols and implementations are audited by independent security agencies. Biocoded is based on the double ratchet protocol that ensures that new encryption keys are continuously derived anew and never used. You get features like encrypted private messaging group chats and chatrooms, and voice and video conferences. It also offers features like time-limited self-destructing messages; confidential end-to-end encrypted live streaming with video on demand replay option; tamper-proof end-to-end encrypted loT access; location services. Biocoded also provides you with a secure gallery for easy access to all your shared media, files, and links. You get complete control of your data and an understating of the cyber landscape and connected risks. In case your phone gets stolen, you can deny access and wipe data of the biocoded app because half of the key is stored in the device and the other half on the biocoded server; neither can access data in isolation. Both are required.

Read more

Biocoded Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website
Box KeySafe logo
Manage your own encryption keys 4.2 Based on 13 Ratings
Visit Website + Add to Compare

What is Box KeySafe and how does it work?

Box KeySafe, you have complete, independent control over your encryption keys with no impact to the user experience. All key usage is unchangeable and includes a detailed record of key usage, so you can track exactly why your organization’s keys are being accessed. And if you ever experience suspicious activity, your security team can cut off access to the content at any time.

Read more

Box KeySafe Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
SmartEncrypt logo
A simple File Encryption Solution Write a Review
Visit Website + Add to Compare

What is SmartEncrypt and how does it work?

SmartEncrypt is a product of DataConfidence solution is next-generation file encryption to secure files and folders. Generate data-specific encryption keys and assign access to individual users or groups. The software integrates with Dropbox, One Drive, and other popular cloud storage services.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 60%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

SmartEncrypt Pricing

  • Free Trial Not Available
  • Starts at $7.00. Offers Free-forever and Custom plan.
Visit Website
Skyflow PII Data Privacy Vault logo
An excellent data privacy vault to protect your customer data Write a Review
Visit Website + Add to Compare

What is Skyflow PII Data Privacy Vault and how does it work?

Skyflow PII Data Privacy Vault helps to enhance innovation by ensuring data privacy, compliance, and security. It also offers a faster time to market so that one can achieve full compliance- GDPR, PCI, CCPA, etc. Besides faster market time, Skyflow PII Data Privacy Vault provides unassailable data privacy. Its customer data management feature handles customer data with care and sensitivity. Skyflow PII Data Privacy Vault further stores customer data using multiple encryptions and tokenisation techniques for optimal security. Also, one can use access control and mask rules to maximise customer data privacy. Skyflow is specifically intended for PII data and PII processes, with strong capabilities that allow it to safely access, analyse, and exchange data without ever decrypting or jeopardising privacy. Its unique approach to data security utilises multiple encryptions that ensure faster performance and high levels of safe data usage. Its vaults are placed anywhere in the globe while providing complete control over data residency and access.

Read more
Visit Website
Xecrets File logo
File Encryption Software Write a Review
Visit Website + Add to Compare

What is Xecrets File and how does it work?

Xecrets File provides maximum-strength AES-256 encryption that is trusted by professionals to reliably and securely protect their precious data. With over 20 years of experience in the file encryption space, our software offers state-of-the-art encryption with no known vulnerabilities. It is simple to use and works across Windows, Linux, and macOS. Xecrets File Ez is perfect for desktop users requiring a graphical user interface to easily encrypt and decrypt files, while the command-line version offers more control and convenience with advanced customization. Both versions are compatible with AxCrypt, making it easy to establish a secure and reliable encryption setup. Developers who need to work with file encryption can use our Software Development Kit (SDK) for .NET to conveniently integrate encryption into their businesses’ automated processes. Xecrets File is the perfect solution for both desktop users and developers requiring robust yet easy-to-use encryption software.

Read more

Xecrets File Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
TokenEx logo
A futuristic tokenisation facility for differential businesses and their ever-changing needs 4.8 Based on 17 Ratings
Visit Website + Add to Compare

What is TokenEx and how does it work?

TokenEx is an independent token service provider, helping out companies enhance their customer payment experience and choose any out of all the available third party providers alike. Companies using TokenEx get to add value to their own business by executing complete control over the tokens available and enjoy greater ownership of the entire payment process at the same time. Also, the platform is safe and secure incorporated with a variety of diverse schemes and universal token criteria to meet differential business needs. Regarding data share and transaction facility, TokenEx is compatible with multiple APIs comprising the desired combination of PSPs and other needed technologies of choice. Companies can even keep sensitive data safe and secure with omnichannel acceptance for batch-wise transactions. Organisations serving payments, retail, travel and insurance mostly depend on TokenEx to get their day to day tasks streamlined in an efficient way.

Read more

TokenEx Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

88% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Iperius Backup logo
Centralized management of endpoints and backups 4.7 Based on 54 Ratings
Visit Website + Add to Compare

What is Iperius Backup and how does it work?

Iperius Console is the advanced tool for centralized management and monitoring of computers and backup. Using either the dedicated desktop application or just the web portal, User can view the results of backup operations, examine the details of any errors, set and customize the backup schedulings and also run backup jobs remotely. The console integrates perfectly with all the products of Iperius Suite, allowing also to remotely update Iperius Backup to the latest version. The large amount of information provided keeps users updated about the status of every PC and Server where Iperius is installed, making Iperius Console an extremely useful IT Monitoring tool, both for customers and your company.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 99%
  • Reviews 77%
  • Momentum 67%
  • Popularity 67%

Iperius Backup Pricing

  • Free Trial Not Available
Visit Website
Sophos SafeGuard Encryption logo
An end to end encryption management portal at your service 4 Based on 27 Ratings
Visit Website + Add to Compare

What is Sophos SafeGuard Encryption and how does it work?

Sophos SafeGuard Encryption is a name that is highly regarded for the unparalleled central device encryption solution it has to offer. Device encryption is the first step towards high-security defence against all sorts of malware and unsolicited practices. Disk encryption ensures total protection for the device regardless of the operating system, which is managed along with the cybersecurity portfolio. The interface of Sophos SafeGuard Encryption is largely intuitive, thus making it easy to set up and manage. There is no server required for deployment or the need for users to configure backend servers accordingly. As remote work schedules are on the rise, it has thus become mandatory for client organisations to keep themselves updated with the regular status of data encryption and thus, demonstrate the necessary compliance. The Sophos SafeGuard Encryption platform, of course, provides all these features along with many other essential functionalities. Moreover, its functional self-service portal enables companies to reduce IT helpdesk related tasks and help their end clients to regain access to devices on the go.

Read more
Visit Website
Cloud Alert logo
End-to-end Encryption Tool Write a Review
Visit Website + Add to Compare

What is Cloud Alert and how does it work?

Cloud Alert is an interactive instant notification system for mobile devices. The software offers transactional alerts for marketing tasks. Report a fraudulent transaction, send a one time password (OTP), and seek customer approval for a transaction in real time. Build better customer experiences with Push Notifications and SMS Messaging to automate business workflows. It supports Mobile Android and iOS.

Read more

Cloud Alert Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.
Visit Website
NetLib Security Encryptonizer Key Manager logo
Encryptionizer Key Manager Write a Review
Visit Website + Add to Compare

What is NetLib Security Encryptonizer Key Manager and how does it work?

NetLib Security Encryptionizer Key Manager allows you to configure and control one or more Clients from a single Manager. From the Manager you can encrypt databases

Visit Website
Seald SDK logo
Avoid data breach with Seald Write a Review
Visit Website + Add to Compare

What is Seald SDK and how does it work?

Seald is a certified end-to-end encryption SDK that unifies the highest level of security in apps. The platform helps every industry to achieve its trust and reduce the risk of data breaches among its customers. These industries include legal, insurance, collaborative work, and telehealth. It is designed for the companies that make data security a crucial priority. Seald has no backdoor as it offers ANSSI-certified robust encryption. It is easy to integrate into apps without having any special knowledge. It provides a transparent experience when used in apps. Not even the servers will be able to have access to data even in the event of a server attack. The privacy of customers' data is assured with its high-quality technology for minimizing its risks. By using it, data becomes safe on the customer side before being sent to any third party or the servers. This way, not even a hosting provider will be able to read or access anything.

Read more

Seald SDK Pricing

  • Free Trial Available
  • Offers Custom plan.
Visit Website
KI Anonymized Analytics logo
A Data Anonymize Tool 4.5 Based on 4 Ratings
Visit Website + Add to Compare

What is KI Anonymized Analytics and how does it work?

KIProtect software is a secure and privacy-focused platform for data workflows. Anonymize all your structured data and can protect data from CSV files, databases, message queues or external APIs. The software uses three independent privacy mechanisms (cryptographic transformation, aggregation and randomization) to protect your data. Generate feature-based datasets for machine learning or probabilistic analysis.

Read more

KI Anonymized Analytics Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Alliance Key Manager logo
Centralized Encryption Key Management Server 4.8 Based on 4 Ratings
Visit Website + Add to Compare

What is Alliance Key Manager and how does it work?

Alliance Key Manager is a solution that provides Enterprise customers, OEMs, and ISVs with a secure method of managing encryption keys for their data security applications.

Alliance Key Manager Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website
Dell Data Protection logo
A Cloud Data Protection Tool 4.1 Based on 22 Ratings
Visit Website + Add to Compare

What is Dell Data Protection and how does it work?

Dell Data Protection software is a Protection tool for your Cloud Organizational Data. The software offers automated data protection for VMware hybrid cloud environments and Tanzu modern applications from cyber-attacks. It has built-in backup appliances with cost-effective data management and protection solutions to meet the requirements for business. IT infrastructures, Medium and Large companies make use of the software.

Read more

Dell Data Protection Pricing

  • Free Trial Not Available
  • Offers Custom plan.
Visit Website

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed