---
description: Page 3 - See the top Encryption Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 3 - Encryption Software - Prices & Reviews - Capterra Ireland
---

Breadcrumb: [Home](/) > [Encryption Software](https://www.capterra.ie/directory/30209/encryption/software) > [Page 3](https://www.capterra.ie/directory/30209/encryption/software?page=3)

# Encryption Software

Canonical: https://www.capterra.ie/directory/30209/encryption/software

Page: 3 / 6\
Prev: [Previous page](https://www.capterra.ie/directory/30209/encryption/software?page=2)\
Next: [Next page](https://www.capterra.ie/directory/30209/encryption/software?page=4)

> Encryption software utilizes built-in encryption, cryptography, and policy controls to convert data in transit or at rest into ciphertext and prevent unauthorized access to digital information.

-----

## Products

1. [CyberArk Privileged Access Management Solutions](https://www.capterra.ie/software/119742/privileged-account-security-solution) — 4.3/5 (27 reviews) — Software to control access to administrative and privileged accounts, manage information leaks and overall risk by automating policies.
2. [AxCrypt](https://www.capterra.ie/software/212854/axcrypt) — 4.9/5 (27 reviews) — A file encryption software tailored for both individual users \&amp; businesses. Advanced Encryption Standard (AES) with a 256-bit key.
3. [Invicti](https://www.capterra.ie/software/171539/netsparker-web-application-security-scanner) — 4.7/5 (26 reviews) — Invicti, formerly Netsparker, is a DAST-first AppSec platform proving real risks, cutting noise, and securing everything at scale.
4. [EventSentry](https://www.capterra.ie/software/120070/eventsentry) — 5.0/5 (22 reviews) — Versatile Log \&amp; Event Log Hybrid SIEM solution with Active Directory, Health \&amp; Inventory monitoring - supports NIST \&amp; CMMC.compliance.
5. [Keybase](https://www.capterra.ie/software/210398/keybase) — 4.6/5 (21 reviews) — On-premise file sharing solution that helps businesses share messages, documents, videos, and photos in an encrypted network.
6. [Bitium](https://www.capterra.ie/software/133412/bitium) — 4.6/5 (19 reviews) — Access control solution for corporate apps that supports integration with third party authentication providers.
7. [Files.com](https://www.capterra.ie/software/169203/files) — 4.6/5 (18 reviews) — Files.com is a secure file platform with encrypted transfer, compliance controls, and audit logging.
8. [Trustifi](https://www.capterra.ie/software/218859/trustifi) — 4.9/5 (18 reviews) — Email security solution that helps manage threat detection, regulatory compliance, data encryption, whitelisting/blacklisting, \&amp; more.
9. [DriveStrike](https://www.capterra.ie/software/186034/drivestrike) — 4.9/5 (16 reviews) — Unified encryption key management \&amp; policies across your devices while maintaining access control on all your endpoints.
10. [RG System Suite](https://www.capterra.ie/software/149140/rg-system) — 4.8/5 (13 reviews) — The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management
11. [Probely](https://www.capterra.ie/software/175244/probe-ly) — 4.8/5 (13 reviews) — Probely is a DAST scanner designed to empower Security and DevOps teams working together to reduce the security risk of web apps \&amp; APIs
12. [x360Cloud](https://www.capterra.ie/software/185546/cloudfinder) — 4.0/5 (12 reviews) — Effortlessly backup and restore ExchangeOnline, OneDrive, SharePoint, and Teams including all files, folders, and document libraries.
13. [Diplomat Managed File Transfer](https://www.capterra.ie/software/160541/diplomat-managed-file-transfer) — 4.7/5 (11 reviews) — The easy way to automate, integrate and encrypt your file transfers, whilst maintaining the highest levels of security and compliance.
14. [BlueFiles](https://www.capterra.ie/software/167724/bluefiles) — 5.0/5 (10 reviews) — BlueFiles is a French solution for the secure exchange of messages and documents (MFT) for professionals.
15. [Jscrambler](https://www.capterra.ie/software/138977/jscrambler) — 4.4/5 (9 reviews) — Leading client-side security solution for JavaScript protection, webpage real-time monitoring, and PCI DSS v4.0 compliance.
16. [Vault](https://www.capterra.ie/software/196236/vault) — 4.8/5 (9 reviews) — Secure, store and control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data.
17. [Mend](https://www.capterra.ie/software/146730/whitesource) — 4.4/5 (8 reviews) — Find \&amp; fix security and compliance issues in open source libraries in real-time
18. [GhostVolt](https://www.capterra.ie/software/192913/ghostvolt) — 4.7/5 (7 reviews) — Encrypt all your sensitive files, folders and business data so only you and your authorised users can access them.
19. [DriveLock](https://www.capterra.ie/software/219612/drivelock) — 4.6/5 (7 reviews) — DriveLock Encryption Solutions encrypt and protect against unauthorized access.
20. [Proton Pass](https://www.capterra.ie/software/1066090/proton-pass) — 4.9/5 (7 reviews) — Proton Pass Business: Securely manage team passwords with end-to-end encryption, auto-fill, safe sharing, and admin controls.
21. [VeraCrypt](https://www.capterra.ie/software/219003/veracrypt) — 4.7/5 (6 reviews) — Disk encryption solution that helps businesses create a virtual encrypted disk within a file and streamline disk mounting operations.
22. [EncryptTitan](https://www.capterra.ie/software/1021985/encrypttitan) — 4.7/5 (6 reviews) — EncryptTitan is an email encryption platform for MSPs and enterprises.
23. [IBM MQ](https://www.capterra.ie/software/1025365/ibm-mq) — 4.3/5 (6 reviews) — Messaging service that connects applications with microservices in private data centers across hybrid or multi-cloud environments.
24. [ManageEngine EventLog Analyzer](https://www.capterra.ie/software/175558/eventlog-analyzer) — 4.8/5 (5 reviews) — ManageEngine EventLog Analyzer is a log management tool for monitoring, auditing, and analyzing logs across IT environments.
25. [NordLocker](https://www.capterra.ie/software/196303/nordlocker) — 4.4/5 (5 reviews) — NordLocker Business is an encrypted cloud storage platform for storing, managing, and sharing business data.

-----

Page: 3 / 6\
Prev: [Previous page](https://www.capterra.ie/directory/30209/encryption/software?page=2)\
Next: [Next page](https://www.capterra.ie/directory/30209/encryption/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.capterra.ie/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.ie/directory/10005/computer-security/software)
- [File Sharing Software](https://www.capterra.ie/directory/30909/file-sharing/software)
- [Email Security Software](https://www.capterra.ie/directory/31358/email-security/software)
- [Endpoint Protection Software](https://www.capterra.ie/directory/30907/endpoint-protection/software)

## Links

- [View on Capterra](https://www.capterra.ie/directory/30209/encryption/software)
- [All Categories](https://www.capterra.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"Capterra Ireland helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ie","url":"https://www.capterra.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":"Capterra Ireland","url":"https://www.capterra.ie/","@id":"https://www.capterra.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Encryption Software","description":"Page 3 - See the top Encryption Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.","url":"https://www.capterra.ie/directory/30209/encryption/software?page=3","about":{"@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#breadcrumblist"},"@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.ie/#website"},"inLanguage":"en-IE","mainEntity":{"@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#itemlist"},"publisher":{"@id":"https://www.capterra.ie/#organization"}},{"@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Encryption Software","position":2,"item":"https://www.capterra.ie/directory/30209/encryption/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.capterra.ie/directory/30209/encryption/software?page=3","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Encryption Software - Prices &amp; Reviews - Capterra Ireland","@context":"https://schema.org","@id":"https://www.capterra.ie/directory/30209/encryption/software?page=3#itemlist","@type":"ItemList","itemListElement":[{"name":"CyberArk Privileged Access Management Solutions","position":1,"description":"CyberArk Privileged Access Management Solutions secure privileged credentials across on-premises, cloud, and hybrid environments. It offers capabilities such as continuous account management, session isolation, and activity remediation. \n\nThe Privileged Access Manager centralizes control over privileged accounts, while the Endpoint Privilege Manager enforces least privilege on desktops and servers. The Vendor Privileged Access Manager enables secure, passwordless vendor access, and the Cloud Entitlements Manager oversees cloud permissions. The solution protects against breaches by securing identities and credentials, facilitating compliance, and enabling digital business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e64cd799-8ecc-42d4-ad8c-c52ef4914cdd.png","url":"https://www.capterra.ie/software/119742/privileged-account-security-solution","@type":"ListItem"},{"name":"AxCrypt","position":2,"description":"AxCrypt is a file encryption software designed to provide secure data protection for individual users and businesses. It uses strong encryption algorithms, particularly the Advanced Encryption Standard (AES) with a 256-bit key, to ensure the confidentiality of sensitive files.\n\nAxCrypt allows users to encrypt files and folders, making them inaccessible to unauthorized individuals. It often integrates with various platforms, including Windows, Mac, iOS, and Android, providing cross-platform compatibility. The software is known for its user-friendly interface, making it accessible for individuals with varying levels of technical expertise.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ddd86105-42cb-4c25-af2e-64cb34d25428.png","url":"https://www.capterra.ie/software/212854/axcrypt","@type":"ListItem"},{"name":"Invicti","position":3,"description":"Invicti Security, formerly Netsparker, delivers application security with zero noise through a DAST-first approach that focuses on real, exploitable vulnerabilities in your running applications. The platform combines enterprise-grade dynamic application security testing (DAST), API security, web asset and API discovery, IAST, and dynamic SCA with static application security testing (SAST), static software composition analysis (SCA), and container security—all within a single, scalable solution. With proof-based scanning, Invicti automatically confirms exploitable vulnerabilities, to reduce false positives and speed remediation. Teams can prioritize real risk, reduce alert fatigue, and confidently secure their entire attack surface. Invicti integrates into modern development pipelines for continuous scanning and actionable insights across the SDLC. Trusted by leading enterprises, Invicti empowers security and DevOps teams to fix what matters most—quickly, accurately, and at scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.capterra.ie/software/171539/netsparker-web-application-security-scanner","@type":"ListItem"},{"name":"EventSentry","position":4,"description":"Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides its users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. Various integrations & multi-tenancy available","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e9d656e-2f63-4cc5-b2ea-51878679d73f.png","url":"https://www.capterra.ie/software/120070/eventsentry","@type":"ListItem"},{"name":"Keybase","position":5,"description":"Keybase is secure messaging and file sharing software that uses end-to-end encryption to ensure messages remain private. The software enables users to send secure messages and create teams to collaborate and share encrypted files and media securely.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/08809454-e868-405d-b7c2-297e23b1a2f2.png","url":"https://www.capterra.ie/software/210398/keybase","@type":"ListItem"},{"name":"Bitium","position":6,"description":"Access control solution for corporate apps that supports integration with third party authentication providers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/23041b2a-7854-48de-ad68-ad45707d90d3.png","url":"https://www.capterra.ie/software/133412/bitium","@type":"ListItem"},{"name":"Files.com","position":7,"description":"Files.com is a file orchestration platform built with enterprise-grade security at its core, supporting encrypted file transfer over SFTP, FTPS, and HTTPS protocols. It provides compliance controls for HIPAA and SOX requirements, granular access permissions, and comprehensive audit logging to meet the security and regulatory needs of organizations in finance, healthcare, and other regulated industries. IT and security teams can enforce access policies, monitor file activity in real time, and manage user authentication through supported SSO providers.\n\nFiles.com has been providing businesses with secure, cloud native file transfers for 10+ years, servicing over 6000+ customers across key industries like healthcare, finance, media, technology, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3dd3c648-f81c-40b3-baae-432e346ab336.png","url":"https://www.capterra.ie/software/169203/files","@type":"ListItem"},{"name":"Trustifi","position":8,"description":"Trustifi offers industry-leading AI-powered solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, encryption & more.\n\nEasily deployed on: Outlook, Gmail, or any email server by relay\n\n**Advanced Threat Protection**:\nPrevent the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Our comprehensive cloud-based email security solution acts as an email filter, using sophisticated AI to scan inbound emails, effectively identifying and blocking email threats.\n\n**Data Loss Prevention**:\n-Mitigate human error and sensitive data leakage with easily enabled DLP to automate email scanning and 256-bit AES encryption.\n-100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more\n\n**Account Takeover Protection**:\n-AI detects anomalies in user behavior with contextual signals\n-Automatically alerts admins and end users of any suspicious account activity and neutralizes threats","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3709bbc5-5a7d-42d3-99ef-7c8907eae4c8.png","url":"https://www.capterra.ie/software/218859/trustifi","@type":"ListItem"},{"name":"DriveStrike","position":9,"description":"Remote wipe, lock, encrypt and locate for all operating systems.  Data & device protection solution for devices that are lost, stolen, missing, or unreturned by personnel. It empowers you to protect devices that have escaped your control, to prevent data compromise. Escrow encryption keys, rotate keys, set PBA policies, offer self-service key recovery, and more. DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5ac7cc25-2f46-4049-8fa5-087bdb293021.png","url":"https://www.capterra.ie/software/186034/drivestrike","@type":"ListItem"},{"name":"RG System Suite","position":10,"description":"RG System Suite is a 100% French SaaS platform designed for MSPs who want to centralise, automate and secure the management of their customers' infrastructures. From a single dashboard, you can monitor your fleets, intervene instantly with Assist remote control, strengthen cybersecurity with Bitdefender technology (EDR, MDR, web filtering, etc.) and protect data via Microsoft 365 and Files & Data backup modules. The suite also includes a sovereign, multi-tenant password manager. Hosted in France, GDPR-compliant, easy to deploy and with no commitment, RG System Suite combines performance, sovereignty, proximity and 100% French-speaking support. Try it free for 30 days.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63d485e7-2cd0-4e9f-b880-369ffa9498c1.png","url":"https://www.capterra.ie/software/149140/rg-system","@type":"ListItem"},{"name":"Probely","position":11,"description":"Probely is the premier cloud-based automated application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs.\n\nWith over 30 000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ad6e9f2a-6c9e-4237-aae7-740c9f3cc7b9.png","url":"https://www.capterra.ie/software/175244/probe-ly","@type":"ListItem"},{"name":"x360Cloud","position":12,"description":"Axcient x360Cloud protects and secures Microsoft 365 and Google Workspace data by providing complete backup and restore for Exchange Online, OneDrive, SharePoint, and Teams, plus Google Drive, including Google Docs, Files, and Folders. x360Cloud supports cloud-to-cloud backup directly from Microsoft 365 or Google Workspace to the Axcient Cloud, and is SOC 2 certified. x360Cloud allows MSPs avoid the risks of being 100% dependent on Microsoft or Google for business continuity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/47ebe59e-c92a-4b57-96f8-671605b8be46.png","url":"https://www.capterra.ie/software/185546/cloudfinder","@type":"ListItem"},{"name":"Diplomat Managed File Transfer","position":13,"description":"Diplomat MFT is a secure managed file transfer (MFT) solution that easily integrates with existing business applications and processes. It supports file transfers using SFTP, FTPS, HTTPS, and AS2. Diplomat MFT also works with cloud storage providers like AWS S3 (and compatible), Azure Files and Blob Storage, Oracle Cloud, Google Cloud, Citrix, ShareFile, Box, Dropbox, SharePoint, Biscom Transit and more.\n\nWith 20+ years of breach-free performance, Diplomat MFT securely and reliably automates the transfer of sensitive files to reduce business risk. It includes built-in PGP encryption, threat intelligence scanning, MFA, least-privilege access, and other features needed to meet regulatory standards required for HIPAA/HITECH, GLBA, PCI/DSS, GDPR and DORA compliance. \n\nIf your organization is facing challenges with compliance, or if you have doubts about scripts and security, look at Diplomat MFT.\n\nStart a free-trial today.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f9ac915-c1e8-45a9-be96-54b1e8059a97.jpeg","url":"https://www.capterra.ie/software/160541/diplomat-managed-file-transfer","@type":"ListItem"},{"name":"BlueFiles","position":14,"description":"BlueFiles is a French solution for the secure exchange of messages and documents (MFT) for professionals.\nIn a user-friendly and fast way, send or receive sensible data with full privacy.\n\nKey Features:\n\nTransfer large files up to hundreds of GB.\nOutlook add-in\nCustomizable safe deposit page\nSecure form\nAutomated sending and receiving utility.\n\nBlueFiles makes it possible to meet compliance and security requirements for the protection of data exchanged.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30266013-a291-45e7-94ec-e99df9a4ceaf.png","url":"https://www.capterra.ie/software/167724/bluefiles","@type":"ListItem"},{"name":"Jscrambler","position":15,"description":"Jscrambler is the industry-leading solution in client-side protection and compliance, empowering online businesses to establish a company-wide client-side security policy. Our pioneer solution is the first to offer a unique blend of advanced 1st party JavaScript obfuscation and runtime protection with state-of-the-art 3rd party script behavior and data-sharing management tool. Jscrambler’s technology is trusted by Fortune\n500 and thousands of companies globally.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7b693439-cc52-4dac-adeb-5da1dea3a3d9.png","url":"https://www.capterra.ie/software/138977/jscrambler","@type":"ListItem"},{"name":"Vault","position":16,"description":"HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Vault's primary use cases include: - Static & Dynamic Secrets Management - Secrets Rotation - Identity Brokering - Data Encryption - Certificate Management - Secrets Scanning\n\nVault has several versions including: - Self Managed Vault Enterprise - HCP Vault Dedicated - HCP Secrets (Multi-Tenant)","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/810fb839-0859-48c8-97e1-e2023c9056d0.png","url":"https://www.capterra.ie/software/196236/vault","@type":"ListItem"},{"name":"Mend","position":17,"description":"The leading solution for agile open source security and license compliance management, WhiteSource integrates with the  DevOps pipeline to detect vulnerable open source libraries in real-time. \n\nIt provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.\nWe support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8add25a5-2da9-4600-a375-633bf1fb727d.png","url":"https://www.capterra.ie/software/146730/whitesource","@type":"ListItem"},{"name":"GhostVolt","position":18,"description":"GhostVolt is a security App which encrypts all your files, folders and business data so only you and your authorised users can access them. \n\nGhostVolt includes: Secure file sharing, Encrypted notes and File comments, Secure collaboration, Auditing and reports, user management and so much more. \n\nGhostVolt helps you and you business fight against data theft and cybercriminals who want to steal your files and use them for ransomware, blackmail, and other criminal attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bab76233-80dd-46ef-8122-d04cfda517af.png","url":"https://www.capterra.ie/software/192913/ghostvolt","@type":"ListItem"},{"name":"DriveLock","position":19,"description":"DriveLock Encryption Solutions are 4 products: BitLocker PBA, Encryption 2-Go, Disk Protection and File Protection. They provide robust data protection by encrypting sensitive information, ensuring it remains secure and inaccessible to unauthorized users. DriveLock Encryption Solutions also offer user-friendly integration, enabling seamless operation without compromising productivity. They support a range of encryption methods, including full disk encryption, file and folder encryption, and removable media encryption, offering comprehensive security for diverse environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/92086413-9e57-4df9-91d3-639683a13f85.jpeg","url":"https://www.capterra.ie/software/219612/drivelock","@type":"ListItem"},{"name":"Proton Pass","position":20,"description":"🔐 1. End-to-End Encryption (E2EE)\nProton Pass uses end-to-end encryption, meaning:\n\nYour passwords and sensitive data (logins, notes, credit cards, etc.) are encrypted on your device before being sent to Proton's servers.\n\nOnly you hold the decryption keys (derived from your master password).\n\nProton cannot see or access your stored data, even if compelled by authorities.\n\n🔑 2. Zero-Knowledge Architecture\nProton Pass operates with a zero-knowledge design: the servers store encrypted blobs of data without ever knowing their contents.\n\nYour master password is never transmitted or stored in any form. It’s used to derive a cryptographic key (via functions like Argon2) on your device.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5ccb4e2-1907-4b3a-9e6a-2aa87a9aa86d.png","url":"https://www.capterra.ie/software/1066090/proton-pass","@type":"ListItem"},{"name":"VeraCrypt","position":21,"description":"Disk encryption solution that helps businesses create a virtual encrypted disk within a file and streamline disk mounting operations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9d523d12-9881-4d46-9129-020d5c28efa6.png","url":"https://www.capterra.ie/software/219003/veracrypt","@type":"ListItem"},{"name":"EncryptTitan","position":22,"description":"EncryptTitan is a full featured encryption system for MSPs & Enterprises that allows users to exchange information securely via email.  EncryptTitan provides organizations with the tools needed to adhere to state and federal privacy regulations while protecting their organization. \n\n100% cloud based, users can seamlessly encrypts messages and attachments for an added layer of security. Email messages are encrypted by the sender, and can only be decrypted by the intended recipient on their device","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0f92bf22-eed6-46ac-be19-9a21bf1aaaf8.png","url":"https://www.capterra.ie/software/1021985/encrypttitan","@type":"ListItem"},{"name":"IBM MQ","position":23,"description":"IBM MQ software offers organizations high industry standards and enhanced security measures to protect their messages against incorrect data and application errors. The software prevents the loss of messages and ensures that each message is only sent once. It has comprehensive multi-style messaging functions and connects various systems with support for message queuing, events, and transactions. The cloud-based platform minimizes the amount of infrastructure and enables firms to leave a light footprint, increasing highly available deployments. It offers automated and intelligent workload balancing, allowing users to design systems and applications to scale. It uses AI technology and analytics tools to manage mission-critical data flowing around the company.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/29df63aa-bbb4-43a3-a2a9-3c9d3987cd2b.png","url":"https://www.capterra.ie/software/1025365/ibm-mq","@type":"ListItem"},{"name":"ManageEngine EventLog Analyzer","position":24,"description":"ManageEngine EventLog Analyzer is a powerful log management and SIEM solution that helps organizations collect, monitor, and analyze logs from Windows and Linux systems, network devices, applications, and more. It provides real-time event correlation, alerting, and in-depth reporting to detect security threats, ensure regulatory compliance (such as HIPAA, PCI-DSS, and GDPR), and support forensic investigations. With its user-friendly interface and automated log collection capabilities, EventLog Analyzer simplifies security auditing and improves visibility across your IT infrastructure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/624c8988-321b-4e2a-9bf0-f3eff8aa872e.png","url":"https://www.capterra.ie/software/175558/eventlog-analyzer","@type":"ListItem"},{"name":"NordLocker","position":25,"description":"NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to store, manage, and share business data securely.\n\nBacked by zero-knowledge architecture, it ensures that no one can have access to your company’s virtual assets except for its members and authorized users. \n\nCreated by the team behind NordVPN, NordLocker Business incorporates the world’s most advanced cryptography algorithms including AES-256 and XChaCha20.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bee99cab-6b32-4dc7-9c8a-a414f9f3d5e8.png","url":"https://www.capterra.ie/software/196303/nordlocker","@type":"ListItem"}],"numberOfItems":25}
</script>
