Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (6)
  • (2)
  • (1)
  • (1)
Deployment
  • (11)
  • (10)
  • (31)
  • (11)
  • (12)
Customer Types
  • (4)
  • (3)
  • (25)
  • (30)
  • (25)
Pricing Model
  • (10)
  • (10)
  • (4)
  • (16)
  • (23)
Integrated With
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 31 Products

Top 5 Boxcryptor Alternatives

Sync.com logo
Keep everything in Sync with Sync.com 3.9 Based on 141 Ratings
Visit Website + Add to Compare

What is Sync.com and how does it work?

Sync.com is a secure Dropbox replacement used by over 700000 companies and individuals globally. Sync makes it convenient for the user's business to collaborate and share securely in the cloud; with zero-knowledge encryption, built-in users file are ultimately secure, safe, and privately managed with Sync. Sync.com is a very useful software as it can be configured for use with multiple users. It is perfect for a business environment where management access control is needed. Through the multi-user collaboration, users can securely collaborate files in a fully secured and shared folder workspace using Sync.com. Sync.com is a cloud-based file storage and sharing forum that includes features such as sending and receiving files, previewing documents, and organizing folders. This tool provides end-to-end encryption, enterprise-grade data replication, HIPAA compliance to ensure secure file storage. The reason users must opt for sync.com software is that it offers access to file promptly, and users can share or upload files from anywhere. It helps employees and businesses to share and collaborate securely with granular user permissions and file preview functionality. Users can choose their sync.com security features with standard, team unlimited, and enterprises pricing strategies.

Read More

Sync.com Pricing

  • Free Trial Not Available
  • Starts at $5.00.
SmartEncrypt logo
A simple File Encryption Solution Write a Review
Visit Website + Add to Compare

What is SmartEncrypt and how does it work?

SmartEncrypt is a product of DataConfidence solution is next-generation file encryption to secure files and folders. Generate data-specific encryption keys and assign access to individual users or groups. The software integrates with Dropbox, One Drive, and other popular cloud storage services.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 60%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

SmartEncrypt Pricing

  • Free Trial Not Available
  • Starts at $7.00. Offers Free-forever and Custom plan.
Tresorit logo
Secure and easy collaboration between teams & partners 4.1 Based on 142 Ratings
Visit Website + Add to Compare

What is Tresorit and how does it work?

Tresorit is an end-to-end encrypted collaboration platform that helps organizations stay compliant when communicating with their internal teams and external partners. Replace risky email attachments with encrypted links. Tresorit empowers you to send and receive files safely from anyone even non Tresorit users. Stay productive on the go and enjoy enterprise-level data security wherever you are. Tresorit is available across all devices and on all browsers. Get the highest standard of data security in the cloud. Tresorit's patented zero-knowledge encryption safeguards your confidential documents.

Read More

Tresorit Pricing

  • Free Trial Available
  • Starts at $10.42. Offers Free-forever plan.
SecureDoc logo
User data protection and encryption made easy 2.8 Based on 4 Ratings
Visit Website + Add to Compare

What is SecureDoc and how does it work?

SecureDoc is a comprehensive disk encryption software helping users secure data at rest (DAR). It functions as a client and server encryption platform to configure, manage, encrypt and decrypt data across organizations. This platform is relied upon by top companies like Samsung, Lenovo, SanDisk, and Intel loaded with reliable features. It also helps businesses to gain access to simplified data security activities, save time and reduce security management costs as well. Also, the software comes equipped with enterprise-grade full disk encryption levels helping businesses eliminate needless complexities through a single console. Businesses leveraging the platform also get access to comprehensive disk encryption facilities backed with centralized BitLocker management, self-encrypting files, and pre-boot authentication systems. Also, users are allowed access to endpoint encryption servers that are compatible with external platforms like Windows, FileVault 2, Linux, and Lenovo. SecureDocs also delivers high-end encryption for physical, virtual, and cloud-based servers to further boost enterprise security levels. Beyond this, a detailed file encryption policy accompanied by a seamless user interface lets users streamline security-related functions with ease. With a simple drag-and-drop approach, users can encrypt specific files and folders reducing complexities.

Read More

SecureDoc Pricing

  • Free Trial Not Available
  • SecureDoc Offers Custom plan.
TeamDrive logo
Secure cloud storage from Germany 4.2 Based on 6 Ratings
Visit Website + Add to Compare

What is TeamDrive and how does it work?

TeamDrive offers you the most affordable entry into the world of professional cloud data security currently on the market. Data synchronization helps you to keep two or more files that are in different locations up-to-date with one another. But data synchronization is not just data synchronization. In terms of functionality and practicability in day-to-day work processes, there are clear differences between the different approaches to data synchronization. Depending on the license package booked, a multitude of configurations can be set centrally.

Read More

TeamDrive Pricing

  • Free Trial Available
  • TeamDrive Offers Custom plan.

Products Similar to Boxcryptor

AxCrypt logo
Advanced encryption in a superbly simple setting 3.9 Based on 7 Ratings
Visit Website + Add to Compare

What is AxCrypt and how does it work?

AxCrypt is an award-winning startup company providing strong and simple encryption software. It all started in 2001, when AxCrypt 1.x was initially created. AxCrypt has since then grown to be one of the world’s most popular encryption software with over 20 million downloads worldwide. The initial author Svante Seleborg teamed up with serial entrepreneur Zebastian Victorin in 2014 to commercialize the product and founded AxCrypt AB to take AxCrypt to the next level.

Read More

AxCrypt Pricing

  • Free Trial Available
  • Starts at $3.75. Offers Free-forever plan.
Trellix Email Security logo
Comprehensive endpoint encryption Write a Review
Visit Website + Add to Compare

What is Trellix Email Security and how does it work?

Trellix keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring and is also available in two suits Some advanced features are data loss prevention, device control, full-disk encryption, and protection for cloud storage; renders the data unreadable if the device is lost or stolen. The encryption solution is FIPS 140-2 and common EAL2+ certified. It encrypts the removable media, file shares, and cloud data- enables you to control the specific file types and folders to encrypt or block. Also, you can encrypt files to cloud storage services such as Box, Dropbox, Microsoft OneDrive, and Google Drive.You can monitor and regulate how employees access, use, and transfer data via common channels, such as instant messages, email, printing, and USB drives—both in and away from the office.Also lets you monitor real-time events and generate detailed reports that show auditors and senior management compliance with internal and regulatory privacy requirements.Trellix has a simple security and policy management-it that establishes and enforces data protection policies while centralizing data security management.

Read More

Trellix Email Security Pricing

  • Free Trial Not Available
  • Trellix Email Security Offers Custom plan.

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Locker logo
Uninterrupted Internet Access Write a Review
Visit Website + Add to Compare

What is Locker and how does it work?

With just one click, you can store your passwords, handle sensitive data, fill out forms, and login to your favourite websites. Locker is here to assist you. Locker uses a military-grade AES-256 encryption scheme, which is backed up by PBKDF2 and RSA. Your data is private and hidden, even from our development team, thanks to end-to-end encryption and zero knowledge. WhiteHub Bug Bounty, a crowdsourced platform with over 1500 security professionals, is constantly testing and improving Locker. For a quick checkout, Locker automatically fills in your login information and credit card information. Shopping takes time, but it does not cost money. Save your valuable time and energy for anything other than typing passwords and filling out personal information. Locker can handle those time-consuming activities. Quickly and securely share passwords and critical data with your colleagues. With Locker, you can encrypt your data and manage your shared files. To protect your data, Locker employs end-to-end encryption and zero knowledge. Without the master password, bad actors will be unable to decrypt your credentials. Locker comes with a slew of useful features, like safe sharing, password health checks, and more.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 88%
  • Reviews 60%
  • Momentum 63%
  • Popularity 66%

Locker Pricing

  • Free Trial Not Available
  • Starts at $1.29. Offers Free-forever and Custom plan.

95% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

GoodSync logo
Backup and synchronization of important files made easy 3.9 Based on 100 Ratings
Visit Website + Add to Compare

What is GoodSync and how does it work?

GoodSync is an efficient file backup and synchronization software ensuring enhanced access and restoration facility. It reduces the backup time, storage usage and network consumption levels by propagating the changes within data blocks. The software runs in the background performing tasks like scheduled, automated and real-time backups. All the versions of an individual data file gets saved within the software’s database, ensuring maximum protection and control to its users. GoodSync uses AES-256 bit encryption offering enhanced data security. It is capable of detecting, renamed files or folders and can execute them as move commands in an automated manner. Bandwidth Throttling feature within GoodSync, monitors the maximum allowed bandwidth speed eliminating unwanted disruptions. An automated conflict resolution module within the platform, gets issues related to data versions resolved in real-time. The software gets connections with remote folders re-established in an automated manner, incase of potential disruptions during data sync or analysis.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 100%
  • Reviews 88%
  • Momentum 65%
  • Popularity 83%

GoodSync Pricing

  • Free Trial Available
  • Starts at $39.95.
Encyro logo
Share your files in a secured and encrypted way 4.8 Based on 34 Ratings
Visit Website + Add to Compare

What is Encyro and how does it work?

Encyro is a compact platform offering easy-to-use secure file-sharing and email encryption services. The solution can be used by law, finance, insurance, health care and real-estate businesses. Thus enabling them to get access to 16 layers of top graded security facilities without creating any shared folders or client accounts. Users can also make requests for electronic signatures backed by facilities like finger drawing without touch-screens, tamper verification, access control, and, encryption. Active compliance with GDPR, HIPAA, PCI-DSS, Gramm Leach Bliley (GLB) Act, etc., helps enterprises keep their clients’ data safe and secure. Encyro lets users review account-related activities on their own, to identify any doubtful movements, including file downloads, logins, or changes within settings. Employers can add partners and employees into the platform to let them share files with clients in a safe and secure way. Moreover, Outlook Addin, Ample Storage Space, Auto-Encryption, Multi-location Encrypted Backup, etc., are other available advantages.

Read More

Encyro Pricing

  • Free Trial Available
  • Starts at $9.99. Offers Free-forever plan.
IBM Security Guardium Data Encryption logo
Keep your database and files protected from misuse 4 Based on 9 Ratings
Visit Website + Add to Compare

What is IBM Security Guardium Data Encryption and how does it work?

IBM Security Guardium Data Encryption is an advanced protection suite for important files and databases. The software comprises an integrated suite of products built on a shared infrastructure and achieves different capabilities such as data access, tokenization, audit logging, data masking, key management, and more. It also enables users to meet various rules and regulations, including CCPA, HIPPA, and GDPR. IBM Security Guardium Data Encryption further provides its users with centralized access controls and key management features for different encryption environments. It helps users to simplify the operations and reduce costs. The software enables data protection across hybrid multi-cloud environments, ensuring top level data security irrespective of their location. Business owners can use IBM Security Guardium Data Encryption for multiple purposes, like encrypting databases, containers, files, and applications. Businesses can encrypt key storage and manage different users’ access policies with the same. Moreover, the software also comes equipped with a cloud key orchestration facility.

Read More

IBM Security Guardium Data Encryption Pricing

  • Free Trial Not Available
  • IBM Security Guardium Data Encryption Offers Custom plan.
Sophos SafeGuard Encryption logo
An end to end encryption management portal at your service 3.8 Based on 27 Ratings
Visit Website + Add to Compare

What is Sophos SafeGuard Encryption and how does it work?

Sophos SafeGuard Encryption is a name that is highly regarded for the unparalleled central device encryption solution it has to offer. Device encryption is the first step towards high-security defence against all sorts of malware and unsolicited practices. Disk encryption ensures total protection for the device regardless of the operating system, which is managed along with the cybersecurity portfolio. The interface of Sophos SafeGuard Encryption is largely intuitive, thus making it easy to set up and manage. There is no server required for deployment or the need for users to configure backend servers accordingly. As remote work schedules are on the rise, it has thus become mandatory for client organisations to keep themselves updated with the regular status of data encryption and thus, demonstrate the necessary compliance. The Sophos SafeGuard Encryption platform, of course, provides all these features along with many other essential functionalities. Moreover, its functional self-service portal enables companies to reduce IT helpdesk related tasks and help their end clients to regain access to devices on the go.

Read More

Sophos SafeGuard Encryption Pricing

  • Free Trial Available
  • Sophos SafeGuard Encryption Offers Custom plan.
ESET Endpoint Encryption logo
Identity and data protection 4.2 Based on 23 Ratings
Visit Website + Add to Compare

What is ESET Endpoint Encryption and how does it work?

Seamless and fully validated encryption and two-factor authentication are solutions to ensure an organization's data is protected in accordance with compliance requirements. Minimize risks of business continuity disruptions and ensure the organization and the data are protected anywhere and anytime. Whether encryption or authentication, both solutions are tailored to keep setup time to the absolute minimum.

Read More

ESET Endpoint Encryption Pricing

  • Free Trial Available
  • Starts at $56.15. Offers Custom plan.
Dell Data Protection logo
A Cloud Data Protection Tool 4 Based on 29 Ratings
Visit Website + Add to Compare

What is Dell Data Protection and how does it work?

Dell Data Protection software is a Protection tool for your Cloud Organizational Data. The software offers automated data protection for VMware hybrid cloud environments and Tanzu modern applications from cyber-attacks. It has built-in backup appliances with cost-effective data management and protection solutions to meet the requirements for business. IT infrastructures, Medium and Large companies make use of the software.

Read More

Dell Data Protection Pricing

  • Free Trial Not Available
  • Dell Data Protection Offers Custom plan.
Keybase logo
End-to-end encryption for things that matter 3.8 Based on 33 Ratings
Visit Website + Add to Compare

What is Keybase and how does it work?

Keybase is secure messaging and file-sharing. Keybase works for families, roommates, clubs, and groups of friends, too. Keybase connects to public identities, too. You can connect with communities from Twitter, Reddit, and elsewhere. Don’t live dangerously when it comes to documents. Keybase can store your group’s photos, videos, and documents with end-to-end encryption.

Read More

Keybase Pricing

  • Free Trial Not Available
  • Keybase Offers Custom plan.
KI Anonymized Analytics logo
A Data Anonymize Tool 4.2 Based on 1 Ratings
Visit Website + Add to Compare

What is KI Anonymized Analytics and how does it work?

KIProtect software is a secure and privacy-focused platform for data workflows. Anonymize all your structured data and can protect data from CSV files, databases, message queues or external APIs. The software uses three independent privacy mechanisms (cryptographic transformation, aggregation and randomization) to protect your data. Generate feature-based datasets for machine learning or probabilistic analysis.

Read More

KI Anonymized Analytics Pricing

  • Free Trial Not Available
  • KI Anonymized Analytics Offers Custom plan.
Albacross logo
B2B lead generation couldn’t get any easier 3.9 Based on 160 Ratings
Visit Website + Add to Compare

What is Albacross and how does it work?

Albacross helps your sales team to generate leads by letting you know exactly who is visiting your site every day. With Albacross, you can find out the current contact details (GDPR compliant personal email addresses) of both companies and individuals who have visited your website, as well as receive recommendations about the best way to contact these potential customers to secure a sale. Albacross provides you with sales intelligence reports with details of which pages these people have visited and how many times they have visited them. This information help salespeople reach out in a more relevant way. All you have to do to set up Albacross is to paste the tracking script it provides into your website backend code, and then you can start receiving analytics reports. Albacross integrates with solutions including Hubspot, Salesforce, Pipedrive, Microsoft Dynamics CRM, and Zoho, and offers Wordpress, Drupal, Google Tag Manager, and Joomla plugins.

Read More

Albacross Pricing

  • Free Trial Not Available
  • Albacross Offers Custom plan.
IronKey EMS logo
Secure & Advanced Storage Management Console 4 Based on 1 Ratings
Visit Website + Add to Compare

What is IronKey EMS and how does it work?

IronKey EMS helps to quickly and easily establish a secure storage command center for administering and policing the use of IronKey Enterprise encrypted flash drives, DataLocker Enterprise encrypted hard drives, and DataLocker Sentry EMS or Sentry ONE encrypted flash drives through this advanced management console. Securely manage all of your organization’s IronKey enterprise secure storage devices and DataLocker or Sentry ONE secure storage devices with cloud-based or on-premises management.

Read More

IronKey EMS Pricing

  • Free Trial Not Available
  • IronKey EMS Offers Custom plan.
Icedrive logo
Next-gen Cloud Storage with Drive Mounting Software Write a Review
Visit Website + Add to Compare

What is Icedrive and how does it work?

Icedrive is a cloud storage platform for both individuals and businesses to manage and update unique cloud storage that functions as a computer hard drive. This is made possible through a revolutionary drive mounting software that imparts the functionality of a physical drive to the cloud storage. Users receive an extensive range of cloud storage applications that can be used in conjunction with a variety of platforms. Team members can easily comment and post suggestions on documents and the showcase page for easier collaboration. With dedicated apps for all leading platforms, Icedrive storage can be directly integrated into the existing technological workflows of the users. The apps are provided on all three major channels including web app, desktop, and mobile. Users can easily sign up and receive up to 10 GB of cloud storage. And with Twofish Encryption, the storage becomes even more secure than AES/Rijndael.

Read More

Icedrive Pricing

  • Free Trial Not Available
  • Starts at $1.67. Offers Free-forever plan.
TokenEx logo
A futuristic tokenisation facility for differential businesses and their ever-changing needs 4.6 Based on 17 Ratings
Visit Website + Add to Compare

What is TokenEx and how does it work?

TokenEx is an independent token service provider, helping out companies enhance their customer payment experience and choose any out of all the available third party providers alike. Companies using TokenEx get to add value to their own business by executing complete control over the tokens available and enjoy greater ownership of the entire payment process at the same time. Also, the platform is safe and secure incorporated with a variety of diverse schemes and universal token criteria to meet differential business needs. Regarding data share and transaction facility, TokenEx is compatible with multiple APIs comprising the desired combination of PSPs and other needed technologies of choice. Companies can even keep sensitive data safe and secure with omnichannel acceptance for batch-wise transactions. Organisations serving payments, retail, travel and insurance mostly depend on TokenEx to get their day to day tasks streamlined in an efficient way.

Read More

TokenEx Pricing

  • Free Trial Not Available
  • TokenEx Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed