Home / Data Security and Privacy / Encryption and Cryptography

Encryption and Cryptography

Secure your data with encryption and cryptography. Protect sensitive information from unauthorized access.

Try these 353 AI Encryption and Cryptography Tools

Camelot Secure
Free

Camelot Secure View Camelot Secure

Camelot Secure360 redefines cybersecurity with a holistic platform designed to streamline your defense posture. Our integrated approach combines best-in-class solutions, expert processes, and advanced behavioral analysis to proactively protect your business from current and future threats. Seamlessly deployable across cloud, hybrid, on-premises, and mobile environments, Secure360 ensures end-to-end, tech-agnostic data encryption for comprehensive security operations.

Holistic Cybersecurity Strategy
Proactive Threat Preparedness
Advanced Behavior Analysis
Ceerus
Free

Ceerus View Ceerus

Ceerus provides a robust, integrated security layer designed to streamline deployment and management across all organizational channels. By ensuring consistent security and compliance, Ceerus empowers enterprises to protect sensitive data and communications from evolving cyber threats, particularly in today's remote work environment. Built for the enterprise, Ceerus leverages advanced technologies like Mikey-Sakke ID-based key management and FIPS 140-2 certified AES encryption to deliver comprehensive data protection.

Unified Security Deployment and Management
Consistent Security and Compliance Across All Channels
Enterprise-Grade Infrastructure Integration
Certera
Free

Certera View Certera

Certera is a leading provider of affordable and modern SSL certificates from top Certificate Authorities like Sectigo and Comodo, alongside our own brand. We are dedicated to your online security and data protection, offering transparent SSL products and website security services that meet industry-leading standards. Protect your website, customers, and confidential information with our comprehensive range of certificates, including DV, OV, EV, Multi-Domain, Wildcard, and EV Code Signing.

Affordable SSL Certificates (DV, OV, EV, Wildcard, Multi-Domain)
Trusted Certificates from Leading CAs (Sectigo, Comodo)
Website Security and Data Protection
Certes
Free

Certes View Certes

Certes, a leader in Data Protection Risk Mitigation (DPRM) for over two decades, provides advanced security technology solutions trusted by 1000 customers in nearly 100 countries. Our FIPS 140-2 and Common Criteria EAL4+ certified technology empowers organizations globally to achieve regulatory compliance and maintain sole control over their sensitive data, regardless of its location or usage. Elevate your security posture and ROI with Certes' proactive cybersecurity solutions.

Advanced Data Protection Risk Mitigation (DPRM)
Solutions deployed by 1000+ customers globally
FIPS 140-2 and Common Criteria EAL4+ certified
Certihash
Free

Certihash View Certihash

Certihash pioneers blockchain-empowered cybersecurity solutions, leveraging NIST framework principles for unparalleled data integrity and security. Our innovative approach utilizes blockchain's inherent transparency, immutability, and decentralization to build a robust infrastructure for faster breach detection and response. The Certihash Sentinel Node is engineered to dramatically reduce the time to identify data breaches, minimizing attack lifecycles and associated costs.

Blockchain-empowered information security tools
NIST Cybersecurity Framework alignment
Immutable and transparent data records
certSIGN
Free

certSIGN View certSIGN

certSIGN is a leading provider of innovative software solutions dedicated to safeguarding information security and protecting information systems. We empower both individuals and legal entities with robust solutions designed to secure sensitive electronic data, ranging from critical documents and online transactions to valuable information residing on workstations and servers. Our offerings encompass integrated cyber security services, advanced data security software, and legally recognized electronic archiving, ensuring comprehensive protection and compliance.

Electronic Signature Solutions
Data Security Software
Integrated Cyber Security Services
CheapSSLWEB
Free

CheapSSLWEB View CheapSSLWEB

CheapSSLWeb.com is a leading global provider of trusted SSL/TLS certificates, partnering with premier Certificate Authorities such as Comodo, Sectigo, DigiCert, and more. We empower businesses to secure their online presence with robust, affordable encryption solutions. Secure your website and earn customer trust with industry-leading SSL certificates from CheapSSLWeb.

Wide range of SSL/TLS certificates from top CAs
Affordable pricing for all business sizes
Enhanced website security and encryption
Cigent Technology
Free

Cigent Technology View Cigent Technology

Cigent Technology safeguards your organization's most critical asset: your data. Leveraging advanced endpoint and managed network security, Cigent proactively prevents ransomware and data theft, extending protection even post-breach. Its proprietary Cigent Dynamic Data Defense Engine® (D³E) offers unparalleled, file-level Zero-Trust access controls, ensuring only authorized users can access sensitive information through automatic encryption and MFA protection across all environments, including cloud, data center, endpoints, and external media.

Cigent Dynamic Data Defense Engine® (D³E) for comprehensive threat prevention
File-level Zero-Trust access controls
Automatic encryption and MFA protection for protected files
Cipher Net Shield
Free

Cipher Net Shield View Cipher Net Shield

Cipher Net Shield delivers robust E-wallet solutions fortified by advanced blockchain and cybersecurity expertise, ensuring unparalleled transaction security and capital recovery. We employ cutting-edge threat intelligence and rapid incident response to proactively defend digital assets against evolving cyber threats. Our meticulous risk assessments and industry-leading technical assurance provide a resilient framework for securing your digital finances and recovering lost capital.

Secure Blockchain E-wallet Solutions
Advanced Threat Intelligence
Rapid Incident Response
Cipher Tooth
Free

Cipher Tooth View Cipher Tooth

CipherTooth provides an advanced, real-time solution for securing internet communications, offering superior defense against Man-in-the-Middle (MItM) attacks without relying on traditional Public Key Infrastructure (PKI). Its unique methodology enhances existing security protocols like HTTPS, delivering robust protection against phishing and spoofing, while maintaining compatibility with multi-factor authentication. Deployable as a web service, appliance, or software, CipherTooth's patented technology can be integrated into existing products or used to develop bespoke security solutions.

Real-time Man-in-the-Middle (MItM) attack detection
Enhanced security beyond traditional HTTPS
PKI-free encrypted tunnel technology
CipherMail
Free

CipherMail View CipherMail

CipherMail delivers advanced email security solutions designed to safeguard sensitive communications for organizations globally. Our comprehensive suite of products ensures robust protection against unauthorized access for emails both in transit and at rest, bolstering your organization's security posture and ROI. Trusted by leading financial, legal, governmental, and healthcare institutions, CipherMail provides the proactive security necessary to mitigate cyber risks.

End-to-end email encryption
Data loss prevention for email
Secure email gateway integration
CipherStash
Free

CipherStash View CipherStash

CipherStash offers a comprehensive data governance and breach prevention platform, addressing the vulnerabilities of traditional access controls by providing universal, end-to-end, searchable, and traceable encryption-in-use. Its precision access control mechanism binds security directly to the data, ensuring consistent protection across all systems and eliminating single points of failure. Empower your organization with identity-based authorization for every data action, guaranteeing granular control, auditable trails, and unparalleled visibility to safeguard sensitive information.

Universal Encryption-in-Use
Searchable Encrypted Data
Traceable Data Access Audit Trail
Ciphertex Data Security
Free

Ciphertex Data Security View Ciphertex Data Security

Ciphertex Data Security is a premier provider of advanced portable data encryption and privacy protection storage systems. Our solutions integrate cutting-edge AES-256 hardware encryption with robust RAID technology and durable chassis designs, ensuring unparalleled security for your sensitive data. Engineered for both Direct Attached Storage (DAS) and Network Attached Storage (NAS), Ciphertex delivers exceptional performance, reliability, and style to safeguard critical information against modern threats.

Advanced AES-256 Hardware Encryption
Durable and Secure Chassis Design
High-Performance RAID Technology
comforte AG
Free

comforte AG View comforte AG

Leverage comforte AG's cutting-edge, data-centric security platform to protect your most sensitive information. Our solutions, featuring advanced tokenization and format-preserving encryption, ensure compliance and safeguard personal data across on-premise, cloud, and hybrid environments. Designed for modern infrastructure, comforte seamlessly integrates with cloud-native stacks and CI/CD pipelines, enabling secure innovation and digital transformation.

Data-Centric Security Platform
Tokenization and Format-Preserving Encryption
Flexible Deployment Options (On-Premise, Cloud, Hybrid)
Communications Security Establishment (CSE) - Canada
Free

Communications Security Establishment (CSE) - Canada View Communications Security Establishment (CSE) - Canada

The Communications Security Establishment (CSE) is Canada's national cryptologic agency, uniquely positioned within the nation's security and intelligence community. CSE leverages advanced code-making and code-breaking capabilities to deliver essential information technology security (IT Security) and foreign signals intelligence (SIGINT) services to the Government of Canada. With internationally recognized expertise in cyber and technical domains, CSE proactively defends government computer networks and systems against evolving threats from foreign states, malicious actors, and cybercriminals.

Foreign Signals Intelligence (SIGINT) Services
Information Technology Security (IT Security) Provision
Advanced Code-Making and Code-Breaking Capabilities
Confidencial
Free

Confidencial View Confidencial

Confidencial provides advanced data protection solutions engineered from cutting-edge DARPA-funded research, ensuring the security of your most sensitive information both internally and externally. Our patented technology seamlessly integrates with everyday desktop applications, offering a user-friendly, point-and-click experience that protects data without hindering productivity or document workflows.

Patented data security technology from DARPA programs
Seamless integration with common desktop applications
User-friendly, point-and-click interface
Cord3
Free

Cord3 View Cord3

Cord3 provides robust data protection by transparently encrypting data with administrator-inaccessible keys and enforcing granular access controls for all users, including privileged administrators. This zero-trust data security solution operates seamlessly across cloud and on-premise environments, protecting both structured and unstructured data without requiring endpoint software. Cord3 complements existing security tools by offering immediate, simplified data encryption and access verification, bypassing the lengthy data classification processes often associated with traditional DLP solutions.

Transparent, administrator-inaccessible data encryption
Granular, real-time data access control
Zero-trust security for data
Cornami
Free

Cornami View Cornami

Cornami enables real-time in-memory computing directly on encrypted data through its groundbreaking TruStream confidential computing architecture. This innovative approach drastically enhances performance for privacy-sensitive applications by eliminating data decryption overhead, offering unparalleled security and real-time insights from massive datasets across edge and cloud environments. By accelerating Fully Homomorphic Encryption (FHE), Cornami empowers organizations with robust data privacy and cloud security solutions.

Real-time confidential computing on encrypted data
Software-defined TruStream computing architecture
Scalable performance without penalties
Coviant Software
Free

Coviant Software View Coviant Software

Coviant Software provides robust Managed File Transfer (MFT) solutions designed for seamless integration into your existing business processes. Automate and secure the transfer and reception of sensitive, business-critical data, thereby significantly reducing operational risks and enhancing data governance. Diplomat MFT streamlines administrator tasks, enforces encryption, and minimizes human error, ensuring your organization's data management, security, and compliance initiatives are effectively supported.

Secure Managed File Transfer (MFT)
Full automation of file transfer tasks
Seamless integration with business processes
CR Group
Free

CR Group View CR Group

CR Group is a premier Swedish-owned cybersecurity firm dedicated to safeguarding vital societal functions across the European market. Leveraging a family of specialized subsidiaries, we deliver intuitive, user-friendly security solutions designed for critical operations. Mollitiam excels in the innovative management of highly classified data through modern network solutions, ensuring secure access to sensitive intelligence, while Tutus provides robust crypto products and services, encompassing everything from secure network infrastructure and smartphones to confidential video conferencing and protected cloud environments.

Solutions for vital societal functions
Easy-to-buy and easy-to-use security products
Specialized subsidiaries with deep expertise
Crown Sterling
Free

Crown Sterling View Crown Sterling

Crown Sterling revolutionizes digital security with its next-generation, AI-driven cryptography solutions. Leveraging proprietary algorithms that incorporate irrational numbers and time dynamics, Crown Sterling offers advanced random number generators and encryption products. Experience enhanced data protection, superior random number generation, and robust encryption with minimal complexity and cost.

AI-driven cryptography
Proprietary irrational number algorithms
High entropy random number generation
CRU Data Security Group (CDSG)
Free

CRU Data Security Group (CDSG) View CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG), established in 1986, is a recognized leader in providing innovative solutions for data mobility, security, encryption, and digital forensics. Their comprehensive product lines, including DataPort, Data Express, and the RTX, RAX, ToughTech, and WiebeTech series, are industry benchmarks for secure physical data transport and robust data protection. Trusted by government, educational, and commercial sectors globally, CRU products ensure the integrity and safety of sensitive data in diverse professional environments.

Pioneer in data mobility and security solutions since 1986
Globally recognized standard for physical data security
Extensive product lines including DataPort, Data Express, RTX, RAX, ToughTech, and WiebeTech
Crygma
Free

Crygma View Crygma

Crygma introduces the next generation of data security with its Quantum-Resistant Cryptographic Machines, engineered to safeguard communications against emerging computational threats. Our mathematically unbreakable encryption ensures absolute data integrity, even against adversaries with unlimited resources. Experience the revolutionary power of homomorphic encryption, allowing you to process and analyze encrypted data without the need for decryption, setting a new benchmark for secure and efficient data handling.

Quantum-Resistant Cryptography
Mathematically Unbreakable Encryption
Homomorphic Encryption Capability
Crypta Labs
Free

Crypta Labs View Crypta Labs

Crypta Labs is at the forefront of IoT security, developing a revolutionary quantum-based encryption chip poised to safeguard the Internet of Things. Our patent-pending technology ingeniously harnesses quantum properties of light, utilizing a mobile device's existing lens and sensors to generate truly random numbers by detecting and counting photons. This groundbreaking approach is designed to secure critical devices where breaches could have life-threatening consequences, including defense systems, healthcare technology, autonomous vehicles, and mobile platforms.

Quantum-based encryption chip for IoT devices
Patent-pending photon detection and random number generation
Leverages existing mobile device hardware (lens and light sensors)