Home / Data Security and Privacy / Encryption and Cryptography

Encryption and Cryptography

Secure your data with encryption and cryptography. Protect sensitive information from unauthorized access.

Try these 353 AI Encryption and Cryptography Tools

TitanFile
Free

TitanFile View TitanFile

TitanFile provides an award-winning, exceptionally secure platform designed for professional communication and document management. It streamlines client, group, and project workflows by automatically organizing communications and files, significantly reducing administrative burdens and boosting productivity. Leveraging multi-level encryption, robust access controls, and comprehensive audit trails, TitanFile ensures stringent compliance and offers unparalleled data security, utilizing encryption standards trusted by U.S. Government agencies for top-secret information.

Award-winning secure communication platform
Automated organization by client, group, or project
Reduces filing overhead and increases productivity
TokenEx
Free

TokenEx View TokenEx

TokenEx offers a cutting-edge Cloud Security Platform designed to protect your most sensitive data and significantly bolster your organization's security posture. Founded by former Qualified Security Assessors, TokenEx provides a resilient and adaptable solution that minimizes risk and compliance scope by tokenizing sensitive information. This data-centric approach removes critical data from your internal systems, preserving its utility while ensuring future-proof operations and improved business outcomes.

Cloud Security Platform for sensitive data protection
Data tokenization to minimize risk and compliance scope
Founded by former Qualified Security Assessors (QSAs)
TorGuard
Free

TorGuard View TorGuard

TorGuard provides robust Virtual Private Network (VPN) services designed to ensure secure, encrypted internet access and protect user identity. Established in 2012, TorGuard has grown into a leading provider offering anonymous VPNs, proxy services, and email encryption for both individuals and businesses globally. With a sprawling network of over 3000 servers across more than fifty countries, TorGuard empowers users to encrypt sensitive data and maintain online privacy, regardless of their location.

Anonymous VPN Services
Encrypted Internet Access
Proxy and Email Encryption
totemo
Free

totemo View totemo

Totemo, a Kiteworks company, provides robust and user-friendly solutions for secure business information exchange. Our patented, FIPS 140-2 validated security platform encrypts both email communications and file transfers, ensuring maximum data protection without compromising usability, even on mobile devices. Seamless integration into existing IT infrastructures makes Totemo the trusted choice for over 3.8 million users across 1,800 companies worldwide.

End-to-end encryption for email and file transfers
FIPS 140-2 validated security platform
Maximum user-friendliness across all devices
Tozny
Free

Tozny View Tozny

Tozny provides robust data protection solutions built on end-to-end encryption and verifiable open-source software, empowering businesses to exceed stringent regulatory compliance standards like GDPR, CCPA, HIPAA, and PCI DSS. Our innovative platforms, TozID and TozStore, deliver encryption-enabled identity management and secure storage, safeguarding sensitive PII and significantly limiting risk exposure, even during security breaches.

End-to-End Encryption
Verifiable Open-Source Software
Compliance with Major Regulations (GDPR, CCPA, HIPAA, PCI DSS, PIPEDA)
Trenton Systems
Free

Trenton Systems View Trenton Systems

Trenton Systems delivers robust, high-performance computing solutions engineered for mission-critical applications in demanding, harsh environments worldwide. Our comprehensive approach encompasses design, manufacturing, assembly, testing, and support, ensuring tamper-free hardware and cybersecure firmware and software, all backed by a rigorously vetted supply chain. We specialize in encrypting, storing, and protecting sensitive data through secure hardware, customizable firmware source code, and advanced software, providing unparalleled data integrity and protection in any operational setting. MIRACL's integration offers the world's sole single-step Multi-Factor Authentication, capable of replacing passwords across all mobile devices, desktops, and Smart TVs.

High-performance computing solutions
Designed for harsh environments
Tamper-free hardware
Tresorit
Free

Tresorit View Tresorit

Tresorit is a comprehensive, end-to-end encrypted cloud collaboration solution designed for businesses requiring uncompromising data security. Leveraging client-side encryption before data reaches the cloud, Tresorit ensures that only authorized users can access sensitive information, eliminating reliance on cloud provider trust. This robust platform facilitates seamless, secure file sharing, synchronization, and collaboration from any location, with granular permission controls and reversible sharing capabilities, all backed by Swiss Post's majority stake for added assurance.

End-to-end encryption with client-side processing
Secure file synchronization and sharing
Zero-knowledge architecture
TriCIS
Free

TriCIS

TriCIS specialized in designing and engineering highly secure, bespoke IT hardware, systems, and services, engineered to meet the most stringent government and military security standards for organizations worldwide. Their expertise encompassed advanced information assurance, including government-grade end-to-end encryption, data-at-rest protection, and integrated solutions for Cyber and Electromagnetic Activities (CEMA). Leveraging a robust history of custom engineering and military experience, TriCIS developed TEMPEST solutions, unique PCoIP and cryptographic encryption technologies, and ruggedized user access devices for demanding environments, offering critical data protection against sophisticated cyber threats until their cessation of business in 2024.

High-security integrated IT solutions
Government and military security standards compliance
Information assurance for global organizations
TrustNXT
Free

TrustNXT View TrustNXT

TrustNXT is the premier provider of advanced software solutions engineered to ensure the integrity and authenticity of digital photos and videos. We empower organizations and individuals to confidently protect their visual content against sophisticated AI-generated or human-induced manipulation and fraud. By leveraging cutting-edge artificial intelligence and machine learning, TrustNXT establishes the benchmark for digital truth, safeguarding your media assets.

AI-driven manipulation detection
Real-time media integrity verification
Immutable digital watermarking
Trustonic
Free

Trustonic View Trustonic

Trustonic is a premier provider of device security solutions, dedicated to safeguarding and enhancing the digital experiences of users worldwide. We empower service providers, automotive manufacturers, app developers, and mobile network operators to deliver secure connected devices and applications across diverse markets. Our advanced technology ensures optimum security, protects valuable digital assets, and fosters trust in every interaction.

Comprehensive device security solutions
Protection for smart connected devices and applications
Enabling trust for service providers, automotive, and mobile operators
TunnelBear
Free

TunnelBear View TunnelBear

TunnelBear is a user-friendly Virtual Private Network (VPN) service provider dedicated to enhancing internet privacy and security for all users. Our mission is to deliver the benefits of private browsing through exceptionally simple applications, ensuring you can access the internet freely and securely, just like everyone else. TunnelBear offers robust encryption to protect your online activities, making it an ideal solution for individuals and businesses seeking to safeguard their digital footprint.

Strong encryption for data protection
User-friendly applications across multiple devices
Secure access to content worldwide
Tuta
Free

Tuta View Tuta

Tuta is a privacy-first secure email, calendar, and contacts application engineered for comprehensive data protection without compromising user privacy. Leveraging state-of-the-art, quantum-safe end-to-end encryption, Tuta ensures your communications remain confidential and accessible only to you. Built on open-source principles, its transparency allows for code inspection, guaranteeing a secure and anonymous digital experience with full Tor and VPN integration, setting a new standard for personal data security.

Full End-to-End Encryption
Quantum-Resistant Security
Anonymous Account Creation
Ubiq Security
Free

Ubiq Security View Ubiq Security

Ubiq Security provides a groundbreaking data-centric security platform that protects any data, on any device, anywhere, without compromising performance or user experience. Our intrinsically secure approach renders stolen data unusable, fulfilling the promise of a connected world. Designed for seamless integration into existing applications, IoT devices, endpoints, and servers, Ubiq dramatically simplifies data security management by eliminating the complexity of traditional encryption methods.

Universal Data Encryption
Zero Performance Impact
Seamless Integration
Utimaco
Free

Utimaco View Utimaco

UTIMACO is a premier global provider of advanced Cybersecurity and Compliance solutions, specializing in the development of robust on-premises and cloud-based Hardware Security Modules (HSMs). The company offers comprehensive solutions for key management, data protection, and identity management, alongside data intelligence for critical infrastructures and Public Warning Systems. With a commitment to innovation and long-term investment security, UTIMACO empowers organizations worldwide to safeguard their sensitive data, identities, and communication networks.

Hardware Security Modules (HSMs)
Key Management Solutions
Data Protection Services
Valarian
Free

Valarian View Valarian

Valarian empowers organizations to achieve seamless, secure, and compliant global collaboration within the framework of digital sovereignty. By integrating with existing communication platforms, Valarian's advanced software addresses complex security, privacy, and regulatory challenges without disruption. Experience unparalleled data confidentiality and real-time secure communication, even on unsecured networks, ensuring operational efficiency and confidence for globally distributed teams.

Seamless integration with existing communication tools
Enhanced data confidentiality with TLS and TDE encryption
Real-time secure communication on any network
Vaultree
Free

Vaultree View Vaultree

Vaultree empowers businesses to operate within a fully end-to-end encrypted environment, revolutionizing secure data communication. Our Encryption-as-a-Service (EaaS) solutions offer unparalleled performance and ease of integration, enabling the processing of massive datasets at unprecedented speeds within a zero-trust framework. This pioneering SDK neutralizes traditional encryption weaknesses, providing a fundamentally safer way to handle sensitive information without compromising efficiency.

End-to-end Encryption as a Service (EaaS)
High-performance data processing
Seamless integration and ease of use
VIBE Cybersecurity International
Free

VIBE Cybersecurity International View VIBE Cybersecurity International

VIBE Cybersecurity International offers a revolutionary approach to secure data with its certificate-less authenticated encryption, built upon identity-based elliptic curve cryptosystems (ECC). This advanced cryptographic solution facilitates scalable and flexible key exchange, empowering seamless integration into IoT, blockchain, fintech, and any connected system requiring robust, unbreakable security. By eliminating the complexities and costs associated with traditional Public Key Infrastructure (PKI), VIBE provides a powerful cryptographic ingredient for embedding paramount security directly into your products and services.

Certificate-less Authenticated Encryption
Identity-Based Elliptic Curve Cryptosystems (ECC)
Scalable and Flexible Key Exchange
Virgil Security
Free

Virgil Security View Virgil Security

Virgil Security delivers robust, developer-friendly cryptographic solutions for seamless integration into applications. Our platform empowers businesses to implement password-free authentication, end-to-end encryption, and immutable data storage through blockchain technology, all without requiring specialized cryptographic expertise. Virgil Security ensures the integrity and privacy of data, devices, and identities, enabling rapid deployment of secure digital products.

Password-free Authentication
End-to-End Encryption
Distributed Immutable Data Storage (Blockchain)
Virtru
Free

Virtru View Virtru

Virtru provides an intuitive data security platform designed to eliminate the conflict between robust data protection and user experience. Trusted by over 7,000 organizations, Virtru enables seamless protection and granular control of sensitive information across all creation, storage, and sharing environments. Its patented Secure User-First Technology™ ensures users can work without complications, using any device, as it integrates directly into existing workflows without separate logins or interfaces.

Patented Secure User-First Technology™ for seamless integration
Trusted Data Format (TDF) for open standard, self-protecting data
Universal data protection across any data type
VLATACOM Institute
Free

VLATACOM Institute View VLATACOM Institute

VLATACOM Institute is an accredited, privately owned R&D institution specializing in advanced encryption and authentication solutions. As a leading system integrator and turn-key provider, VLATACOM offers comprehensive protection for communications and data across various platforms, from personal mobile devices to high-capacity digital transport systems. Their proprietary solutions, including vPCP-V, vREBECCA, and vLAD, coupled with the vKDS key distribution system, ensure robust security and granular control over access to sensitive information.

Advanced encryption for mobile and landline communications (vPCP-V)
Bulk encryption for high-capacity digital transport systems (vREBECCA)
Secure device access solutions (vLAD)
Vysk Communications
Free

Vysk Communications View Vysk Communications

Vysk Communications offers an award-winning, patented secure voice communication system designed to safeguard sensitive conversations. Unlike software-only solutions, Vysk's technology provides unparalleled security by protecting the hardware endpoints of smartphones, making it the ideal choice for at-risk businesses and governments globally seeking robust mobile privacy.

Award-winning secure mobile communication system
Patented True End-to-End Encryption
Hardware endpoint security for microphones, cameras, and speakers
Walacor
Free

Walacor View Walacor

Walacor redefines enterprise data security with its next-generation blockchain-powered platform. Offering robust record-level protection, it creates an unbreachable 'wall around your core data' against internal and external threats. WalacorDB seamlessly integrates advanced security, blockchain innovation, and high performance, providing a quantum-resistant, turnkey solution for secure data storage and sharing.

Next-generation secure data and blockchain storage
Trust-first approach for enterprise data management
Record-level data protection ('wall around your core data')
Wibu-Systems
Free

Wibu-Systems View Wibu-Systems

Wibu-Systems is a global leader in intelligent protection for software, digital assets, and intellectual property. Leveraging decades of expertise, we deliver robust Digital Rights Management (DRM) and anti-piracy solutions designed to safeguard against unauthorized access, cyber-attacks, and tampering. Our innovative technologies, including advanced encryption and secure hardware, empower businesses to control software licensing, prevent piracy, and ensure the integrity of their valuable digital products and devices.

Comprehensive Software Protection
Flexible Software Licensing
Advanced Digital Rights Management (DRM)
Wickr
Free

Wickr View Wickr

Wickr, now an Amazon Web Services company, delivers unparalleled secure communication solutions for the world's most critical dialogues. Trusted globally for its military-grade encryption and robust privacy controls, Wickr empowers organizations to safeguard sensitive information and maintain compliance, even in highly regulated environments. Its comprehensive administrative features ensure secure, scalable deployment for IT teams, while end-users benefit from seamless, protected collaboration.

End-to-end military-grade encryption
Robust user privacy controls
Scalable administrative deployment