---
description: Discover and compare Encryption Software Applications & Tools for Mac. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Encryption Software for Mac - Price comparison & Reviews - Capterra Israel 2026
---

Breadcrumb: [Home](/) > [Encryption Software for Mac](https://www.capterra.co.il/directory/30209/encryption/software) > [Page 3](https://www.capterra.co.il/directory/30209/encryption/software?page=3)

# Encryption Software

Canonical: https://www.capterra.co.il/directory/30209/encryption/software

Page: 3 / 3\
Prev: [Previous page](https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=2)

> Encryption software utilizes built-in encryption, cryptography, and policy controls to convert data in transit or at rest into ciphertext and prevent unauthorized access to digital information.

-----

## Products

1. [Proton Pass](https://www.capterra.co.il/software/1066090/proton-pass) — 4.9/5 (7 reviews) — Proton Pass Business: Securely manage team passwords with end-to-end encryption, auto-fill, safe sharing, and admin controls.
2. [NordLocker](https://www.capterra.co.il/software/196303/nordlocker) — 4.4/5 (5 reviews) — NordLocker Business is an encrypted cloud storage platform for storing, managing, and sharing business data.
3. [ITAC SecureFile](https://www.capterra.co.il/software/1052630/itac-securefile) — 4.8/5 (5 reviews) — Secure \&amp; optimize your file transfers with ITAC SecureFile MFT: encryption, automation \&amp; real-time monitoring.
4. [PII Tools](https://www.capterra.co.il/software/1019234/pii-tools) — 4.8/5 (4 reviews) — Discover, analyze, and remediate sensitive data with PII Tools. Fast, accurate, and easy to use for audits, breaches, and compliance.
5. [CloudConnexa](https://www.capterra.co.il/software/1034033/cloud-connexa) — 4.0/5 (4 reviews) — The cloud-delivered, virtualized secure network platform that delivers essential zero trust network access (ZTNA) and VPC integration.
6. [Uniqkey](https://www.capterra.co.il/software/1049523/uniqkey) — 5.0/5 (4 reviews) — Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, an
7. [Cryptomator](https://www.capterra.co.il/software/1017931/cryptomator) — 5.0/5 (3 reviews) — Cryptomator is a free open source encryption software system that secures files stored in the cloud.
8. [ClearVPN](https://www.capterra.co.il/software/217992/clearvpn) — 4.5/5 (2 reviews) — ClearVPN is the first effortless VPN for a personalized and secure online experience. Unblock sites, encrypt the connection, change IP.
9. [Bitwarden Secrets Manager](https://www.capterra.co.il/software/1053938/secrets-manager) — 5.0/5 (2 reviews) — Bitwarden Secrets Manager is an end-to-end encrypted secrets management tool to store, manage, automate, and share developer secrets.
10. [CloudJacket MXDR](https://www.capterra.co.il/software/212808/cloudjacketx) — 5.0/5 (1 reviews) — High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.
11. [NoID](https://www.capterra.co.il/software/1037580/noid) — 5.0/5 (1 reviews) — B2B Secure Email Encryption Platform. We protect email, we protect what you write, what you read, what you attach and more.
12. [FTAPI](https://www.capterra.co.il/software/132402/ftapi) (0 reviews) — FTAPI is the market leader in Europe for sensitive data workflows and automations. Using leading encryption technologies, these workflo
13. [strongDM](https://www.capterra.co.il/software/181859/strongdm) (0 reviews) — StrongDM secures and manages privileged access across any infrastructure with policy-based action control.
14. [PrivMX Fusion](https://www.capterra.co.il/software/207925/privmx) (0 reviews) — All-in-one, privacy-by-design collaboration software protecting all data with end-to-end encryption on zero-knowledge servers.
15. [Symantec Encryption](https://www.capterra.co.il/software/1018636/symantec-endpoint-encryption) (0 reviews) — Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance.
16. [CenterDevice](https://www.capterra.co.il/software/1023397/centerdevice) (0 reviews) — CenterDevice is cloud-based software for the management of sensitive documents in accordance with the GDPR, GoBD, and C5 guidelines.
17. [LAN Crypt File and Folder Encryption](https://www.capterra.co.il/software/1031379/conpal-lan-crypt) (0 reviews) — Protects personal, sensitive and business-critical data from unauthorized access.
18. [Socializer Messenger](https://www.capterra.co.il/software/1042267/socializer-messenger) (0 reviews) — The Socializer Messenger is a highly encrypted solution for internal communication combining security, privacy and business features.
19. [WorkBot](https://www.capterra.co.il/software/1062632/workbot) (0 reviews) — AI-powered chatbot, chat agent, and voice agent that automate support, engage users, and boost business efficiency.
20. [Klarytee](https://www.capterra.co.il/software/1062917/klarytee) (0 reviews) — Data-centric Governance Platform. Visibility. Protection. Control For AI \&amp; Beyond.
21. [Xecrets Ez](https://www.capterra.co.il/software/1070388/Xecrets-Ez) (0 reviews) — Xecrets Ez uses strong AES-256 encryption to protect files and text on Windows, macOS, and Linux.
22. [Confidencial](https://www.capterra.co.il/software/1070748/Confidencial) (0 reviews) — Selective encryption and granular access controls become a part of the file's metadata, ensuring security follows your data everywhere.
23. [Proton Drive](https://www.capterra.co.il/software/1076524/Proton-Drive) (0 reviews) — Proton Drive is a cloud storage software that provides secure file access and sharing with end-to-end encryption technology.
24. [MySecureFolder](https://www.capterra.co.il/software/1083841/MySecureFolder) (0 reviews) — Cloud-based file protection software for Windows that uses AES-256-GCM encryption to block unauthorized access and copying.
25. [ANKASecure](https://www.capterra.co.il/software/1087030/ANKASecure) (0 reviews) — Crypto agility orchestration platform that separates applications from cryptographic execution — enabling quantum-ready transitions.

-----

Page: 3 / 3\
Prev: [Previous page](https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=2)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.il/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.il/directory/10005/computer-security/software)
- [File Sharing Software](https://www.capterra.co.il/directory/30909/file-sharing/software)
- [Endpoint Protection Software](https://www.capterra.co.il/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.co.il/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.co.il/directory/30209/encryption/software)
- [All Categories](https://www.capterra.co.il/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Capterra Israel helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.co.il","url":"https://www.capterra.co.il/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.co.il/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":null,"url":"https://www.capterra.co.il/","@type":"WebSite","@id":"https://www.capterra.co.il/#website","publisher":{"@id":"https://www.capterra.co.il/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.il/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Encryption Software","description":"Discover and compare Encryption Software Applications & Tools for Mac. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.","url":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3","about":{"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#webpage","mainEntity":{"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#itemlist"},"isPartOf":{"@id":"https://www.capterra.co.il/#website"},"inLanguage":"en-IL","publisher":{"@id":"https://www.capterra.co.il/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Encryption Software for Mac","position":2,"item":"https://www.capterra.co.il/directory/30209/encryption/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.capterra.co.il/directory/30209/encryption/software?page=3","@type":"ListItem"}],"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Encryption Software for Mac - Price comparison &amp; Reviews - Capterra Israel 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Proton Pass","position":1,"description":"🔐 1. End-to-End Encryption (E2EE)\nProton Pass uses end-to-end encryption, meaning:\n\nYour passwords and sensitive data (logins, notes, credit cards, etc.) are encrypted on your device before being sent to Proton's servers.\n\nOnly you hold the decryption keys (derived from your master password).\n\nProton cannot see or access your stored data, even if compelled by authorities.\n\n🔑 2. Zero-Knowledge Architecture\nProton Pass operates with a zero-knowledge design: the servers store encrypted blobs of data without ever knowing their contents.\n\nYour master password is never transmitted or stored in any form. It’s used to derive a cryptographic key (via functions like Argon2) on your device.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5ccb4e2-1907-4b3a-9e6a-2aa87a9aa86d.png","url":"https://www.capterra.co.il/software/1066090/proton-pass","@type":"ListItem"},{"name":"NordLocker","position":2,"description":"NordLocker Business is an end-to-end encrypted cloud storage platform that allows you to store, manage, and share business data securely.\n\nBacked by zero-knowledge architecture, it ensures that no one can have access to your company’s virtual assets except for its members and authorized users. \n\nCreated by the team behind NordVPN, NordLocker Business incorporates the world’s most advanced cryptography algorithms including AES-256 and XChaCha20.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bee99cab-6b32-4dc7-9c8a-a414f9f3d5e8.png","url":"https://www.capterra.co.il/software/196303/nordlocker","@type":"ListItem"},{"name":"ITAC SecureFile","position":3,"description":"Are your file transfers insecure or inefficient?\n\nOptimize and protect data exchange with ITAC SecureFile MFT. Today, businesses handle large volumes of information, but many struggle with slow transfers, risks of leaks, and poor visibility into their sensitive files.\n\nWith ITAC SecureFile MFT, you can:\nEnsure security with advanced encryption and regulatory compliance.\nAutomate transfers and reduce manual errors.\nEnsure traceability with real-time monitoring and auditing.\n\nWith SecureFile MFT, forget about risks and optimize your data exchange processes.\n\nContact us and take the security of your transfers to the next level!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d862283a-e1fe-46a0-a3f3-ef6c418c7167.png","url":"https://www.capterra.co.il/software/1052630/itac-securefile","@type":"ListItem"},{"name":"PII Tools","position":4,"description":"PII Tools: Your All-in-One Solution for Sensitive Data Discovery and Compliance\n\nPII Tools helps businesses discover, analyze, and manage sensitive data across all environments – cloud storage, databases, endpoints, emails, and more. Whether for breach incident management, compliance audits, data migration, or client assessments, PII Tools delivers over 99% AI detection accuracy, ranking among the best on the market.\n\nBuilt for ease of use, PII Tools requires no specialized IT skills. Identify and classify PII, PCI, and PHI, automate remediation workflows, and generate actionable reports with a user-friendly platform. Stay compliant with regulations like GDPR, HIPAA, and PCI DSS while saving time with automation features like recurring scans and delta scanning.\n\nWith intuitive design, powerful automation, and unmatched precision, PII Tools empowers IT teams, compliance officers, and data privacy professionals to confidently manage data risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cd4de37b-bd61-4145-8a9e-75d16dfacf95.jpeg","url":"https://www.capterra.co.il/software/1019234/pii-tools","@type":"ListItem"},{"name":"CloudConnexa","position":5,"description":"With CloudConnexa your business gets a cloud-delivered service that integrates virtual networking and critical security functions in a secure overlay network that’s easy to deploy and manage. Now you can connect your applications, private networks, workforce, and IoT devices - without complex, hard-to-scale hardware.\n\nYour dedicated secure overlay network enables Zero Trust access to all applications and the internet as well as site-to-site networking while enforcing identity-based access control, preventing malicious network activity, and providing protection by blocking malicious website access.\n\nThe CloudConnexa full-mesh network is accessible from 30+ worldwide locations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7401dd2-15d4-415c-b3bc-95e583892263.jpeg","url":"https://www.capterra.co.il/software/1034033/cloud-connexa","@type":"ListItem"},{"name":"Uniqkey","position":6,"description":"Uniqkey: Protect every login. Access with confidence.\n\nUniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control.\n\nWe remove complexity from everyday workflows, helping employees stay secure without slowing them down. From auto-filling 2FA codes to streamlining access across your cloud environment, Uniqkey keeps security frictionless and productivity high.\n\nBuilt for Europe. Hosted in Europe. Committed to European sovereignty.\n\nAt Uniqkey, Europe isn’t just where we’re from - it’s who we’re built for.\n\nWith all data hosted locally on European soil and infrastructure based in Denmark, we guarantee data sovereignty, GDPR compliance, and full alignment with European regulatory frameworks. In a time when EU organisations increasingly prioritise European-made security solutions, Uniqkey delivers peace of mind by keeping your sensitive data secure, private, and fully under European jurisdiction.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc919295-4126-4dc5-8e49-4cb66150e7f9.png","url":"https://www.capterra.co.il/software/1049523/uniqkey","@type":"ListItem"},{"name":"Cryptomator","position":7,"description":"Cryptomator is open source encryption software that allows users to encrypt files before uploading them to cloud storage services like Dropbox. Cryptomator uses AES-256 bit encryption to secure files and filenames, giving users sole control over the decryption keys. The software provides a virtual encrypted drive for protecting data, and it can be used across devices, integrating encryption between local data and the cloud.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e57e3218-6db1-4aac-88ae-ed6a5d7de3e4.png","url":"https://www.capterra.co.il/software/1017931/cryptomator","@type":"ListItem"},{"name":"ClearVPN","position":8,"description":"ClearVPN - is the only VPN you need. Because it clearly understands you. Whether you need to expand your online experience or secure data. Unlike other apps that leave you choosing servers and countries, ClearVPNs unique DynamicFlow technology optimizes your network settings to fit your goals. With the apps beautiful design, you can finally focus on enjoying online interaction and forget about tricky technical details. Strict no-logs policy and top-tier encryption make your data safe.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8952245-68bd-47d6-a101-2e21665c04ac.png","url":"https://www.capterra.co.il/software/217992/clearvpn","@type":"ListItem"},{"name":"Bitwarden Secrets Manager","position":9,"description":"Bitwarden Secrets Manager is an end-to-end encrypted secrets management solution that empowers development teams to easily store, manage, automate, and share secrets at scale and facilitate programmatic machine-to-machine interactions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d8e2eba2-976b-4183-9813-ed167cea31f4.png","url":"https://www.capterra.co.il/software/1053938/secrets-manager","@type":"ListItem"},{"name":"CloudJacket MXDR","position":10,"description":"CloudJacket MXDR is a fully managed security platform that detects, investigates, and responds to threats across your entire environment. Real protection without the need to stitch together multiple tools, eliminating the burden of building or expanding an internal Security Operation Center. \n\nOur solution unifies EDR, ITDR, SIEM, and Cloud security into a single pane of glass, while our 24/7 U.S. based SOC does the work most “managed” providers leave to you. \n\nHigh-fidelity security where agentic AI handles the volume while human analysts validate every real threat. Our team proactively hunts for what automation misses and takes decisive action when it matters most. This approach enables rapid isolation of compromised systems, termination of malicious processes, and providing guided remediation with full incident context. \n\nWe operate as an extension of your team. One platform. One partner. Faster response times.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.capterra.co.il/software/212808/cloudjacketx","@type":"ListItem"},{"name":"NoID","position":11,"description":"B2B Secure Email Encryption Platform. Encrypted email and with added intelligence.\n\nWe protect email, we protect what you write, what you read, what you attach and more. We added intelligence to email\n\nNoID SecureEmail delivers email from A to B encrypted \"On send\", decrypted \"On receive\". It runs parallel to your existing email solution without any requirement to change.\n\nInvisible to end-users and compatible with existing Email apps.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6ba8092c-4ba8-41cb-abb3-ec0e82952f22.png","url":"https://www.capterra.co.il/software/1037580/noid","@type":"ListItem"},{"name":"FTAPI","position":12,"description":"FTAPI is the market leader in Europe for sensitive data workflows and automations. Using leading encryption technologies, these workflows are protected at all times - whether it concerns sending or receiving data, structured data input, sharing confidential information or secure automation.\n\nOver 2000 customers and more than 1 million active users trust in FTAPI.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/567c943e-b600-4340-a0e1-6f2eb3c936ca.png","url":"https://www.capterra.co.il/software/132402/ftapi","@type":"ListItem"},{"name":"strongDM","position":13,"description":"StrongDM is a policy-based Zero Trust privileged access management (PAM) solution that provides dynamic privileged action control for any type of infrastructure. It helps security teams stop unsanctioned actions while ensuring continuous compliance. Additionally, it facilitates streamlined reporting on user activity for IT, security, DevOps, and compliance teams via comprehensive audit logs. Supports all modern infrastructure, including databases, servers, Kubernetes clusters, clouds, and web applications. StrongDM combines authentication, authorization, networking, and observability into a single platform, providing secure and auditable access for the precise amount of time that access is needed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc9c7ad6-1099-438c-a99e-e6c8710e321c.png","url":"https://www.capterra.co.il/software/181859/strongdm","@type":"ListItem"},{"name":"PrivMX Fusion","position":14,"description":"PrivMX Fusion is all-in-one, privacy-by-design collaboration software for hybrid and remote teams, protecting all data with zero-knowledge encryption. It's user-friendly and intuitive, supporting creativity and offering a new approach to effective teamwork. With all necessary Tools integrated within one digital workspace,  it helps teams organise tasks, files and communication in a fresh new way, making it easier to look at projects from various angles and see the big picture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/664b1ee0-ea2e-446b-b659-e70a2fcc4760.png","url":"https://www.capterra.co.il/software/207925/privmx","@type":"ListItem"},{"name":"Symantec Encryption","position":15,"description":"Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. Additionally, this solution supports BitLocker, File Vault, and Symantec encryption.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/710b266d-26ee-4080-9aa7-efabeebe42cc.jpeg","url":"https://www.capterra.co.il/software/1018636/symantec-endpoint-encryption","@type":"ListItem"},{"name":"CenterDevice","position":16,"description":"CenterDevice is a business cloud service, which supports document management and complies with GDPR, GoBD, and C5 guidelines. Several functions are available for this purpose, including CenterLink, SmartArchive, and SmartVersion. CenterLink enables the secure exchange of documents via external links, SmartArchive is used to archive documents, and SmartVersion can be used to track changes. CenterDevice is designed to support teamwork.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e9149d4f-abd3-4ae6-a594-0380a0194518.png","url":"https://www.capterra.co.il/software/1023397/centerdevice","@type":"ListItem"},{"name":"LAN Crypt File and Folder Encryption","position":17,"description":"u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management.\n\nThe cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% independent from the (cloud) providers you may use.\n\nOn top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/371490df-3709-40c4-9129-e40e081847e3.png","url":"https://www.capterra.co.il/software/1031379/conpal-lan-crypt","@type":"ListItem"},{"name":"Socializer Messenger","position":18,"description":"The Socializer Messenger is a GDPR-compliant secure messenger for internal communication of companies and governments. \n\nIt's equipped with unique privacy features and military grade encryption for calls, conferences and chats. A built-in facial recognition hides confidential chats, contacts and folders when an intruder is identified by the front camera. By integrating a document scanner, PDF reader and file manager into the Messenger’s secure sandbox, all data is protected from external access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b1a452c5-52a5-4b6a-89e8-c15f0f526782.webp","url":"https://www.capterra.co.il/software/1042267/socializer-messenger","@type":"ListItem"},{"name":"WorkBot","position":19,"description":"WorkBot is an AI-powered solution that combines chatbots, chat agents, and voice agents to automate customer support, qualify leads, and streamline workflows. Built for businesses of all sizes, WorkBot integrates seamlessly with your systems to deliver 24/7 assistance, reduce response times, and enhance user experiences across web, messaging apps, and voice platforms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9344195-c679-48b4-a81a-6a1555e993b4.jpeg","url":"https://www.capterra.co.il/software/1062632/workbot","@type":"ListItem"},{"name":"Klarytee","position":20,"description":"Klarytee Ltd is a data-centric governance platform for IT-enabled environments and AI systems. Built for government and regulated-sector organisations handling sensitive, legally privileged, or regulated data. \n\nThe platform operates directly on the data itself. It discovers and catalogues data across the data estate, identifies sensitive elements at fine granularity, and applies selective fragment-level encryption. Access and usage policies are cryptographically bound to protected data elements and enforced using least-privileged, need-to-know access for both human users and AI agents, including within RAG and other AI pipelines. These controls govern both AI inputs and AI outputs and persist as data is accessed, transformed, embedded, or shared. The platform provides continuous intelligence on data access, movement, and policy enforcement, supporting governance, audit, and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03a49a84-7113-44a0-bcca-921800b31b94.png","url":"https://www.capterra.co.il/software/1062917/klarytee","@type":"ListItem"},{"name":"Xecrets Ez","position":21,"description":"Xecrets Ez is a free, cross-platform desktop application for secure file encryption, available for Windows, macOS, and Linux.\n\nIt provides zero-knowledge AES-256 encryption with a simple interface, allowing users to encrypt and decrypt files quickly and safely.\n\nWhen encrypting, the original file is securely wiped to prevent data leakage.\n\nXecrets Ez works entirely offline—no cloud services or accounts are required—making it ideal for users who value privacy and control. \n\nThe app is compatible with the AxCrypt file format (.axx), ensuring access to older encrypted files.\n\nPremium features include YubiKey support for hardware-based security, Shamir’s Secret Sharing for distributed backup of secrets, and bulk encryption.\n\nBuilt on the open-source Xecrets Cli, Xecrets Ez provides transparency and trust, with all cryptographic operations handled locally on the user's device.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c14c5b23-31f9-418d-8860-616a3fffe478.png","url":"https://www.capterra.co.il/software/1070388/Xecrets-Ez","@type":"ListItem"},{"name":"Confidencial","position":22,"description":"Our technology differs from typical ‘all or nothing’ solutions by allowing precise control over what gets encrypted and who gets access. Selective encryption for sensitive data within documents enhances security and productivity by leaving the rest of the document accessible to other stakeholders.\n\nConfidencial goes beyond file-level access controls, offering granular protection at the data level. With our fine-grained access controls and patented selective encryption, you can encrypt and control access down to the specific data points and data fields in a document. This approach fortifies security while maximizing the utility of non-sensitive information for stakeholders and LLMs. \n\nConfidencial embeds encryption and security controls within the documents’ metadata, ensuring security remains intact no matter how documents are shared or stored. With Confidencial, nothing gets in the way of collaboration, innovation, and productivity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/29a59fcd-c39a-4547-9b98-577bacbfc2ea.jpeg","url":"https://www.capterra.co.il/software/1070748/Confidencial","@type":"ListItem"},{"name":"Proton Drive","position":23,"description":"Proton Drive is a cloud storage software that provides end-to-end encrypted file storage services. The platform features secure document collaboration capabilities, allowing users to create, edit, and share documents while maintaining privacy protection through encryption. \n\nProton Drive offers file sharing functionality with optional password protection and expiring links and includes automatic backup systems that store data across multiple datacenters for continuous accessibility. Users can store various file types including documents, photos, and videos, with free accounts receiving storage allocation and paid plans offering expanded capacity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f7735ddb-6c74-4018-94d2-ea100786a8ff.png","url":"https://www.capterra.co.il/software/1076524/Proton-Drive","@type":"ListItem"},{"name":"MySecureFolder","position":24,"description":"Windows security software that protects files and folders using AES-256-GCM encryption and Argon2id password hashing. The software implements dual-layer security by combining password protection with Wi-Fi network verification, allowing access only when connected to pre-approved networks. It features automatic backups for data recovery and export/import functionality for transferring protected folders between devices. MySecureFolder includes activity logging to track folder access and offers two recovery options: offline recovery keys and email-based verification. The interface supports dark mode and follows modern design principles. The application employs industry-standard cryptographic techniques including authenticated encryption and secure key derivation to maintain file security at the file system level.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c41713e-a9d0-4934-80f3-3701cc636b8b.jpg","url":"https://www.capterra.co.il/software/1083841/MySecureFolder","@type":"ListItem"},{"name":"ANKASecure","position":25,"description":"ANKASecure©  is a crypto agility orchestration platform that structurally separates applications from cryptographic execution. Instead of hardcoding algorithms into application code, applications reference cryptographic identities — ANKASecure© resolves algorithm family, hybrid configuration, lifecycle state, and policy constraints dynamically at runtime.\nThis means cryptographic transitions become policy updates, not engineering projects. Organizations can migrate from classical to post-quantum cryptography at their own pace, application by application, without exposing plaintext or rewriting code.\nKey capabilities include: 125+ algorithms across 21+ families (classical, hybrid, and post-quantum); centralized policy-driven governance; seamless legacy modernization via REST APIs, Java SDK, and CLI; multi-tenant isolation with HSM-backed key protection; and support for 14+ international standards including NIST, BSI, ANSSI, ETSI, and KISA. Deploy as SaaS, on-premise, or air-gapped.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6f0769f8-8250-49d2-822f-e290bf07ddaa.png","url":"https://www.capterra.co.il/software/1087030/ANKASecure","@type":"ListItem"}],"@id":"https://www.capterra.co.il/directory/30209/encryption/deployment-options/mac/software?page=3#itemlist","numberOfItems":25}
</script>
