17 years helping Israeli businesses
choose better software
Encryption Software
Encryption software utilizes built-in encryption, cryptography, and policy controls to convert data in transit or at rest into ciphertext and prevent unauthorized access to digital information.
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Filter Results (181)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Israel
Pricing Options
Product type
Show local products
181 results
Sort by
Protect personal data with SecureDoc easy installation, robust encryption and diverse authentication options for all compliance needs.
Learn more about SecureDoc Disk Encryption
SecureDoc ensures your personal information and intellectual property is secure while withstanding the most rigorous compliance demands. The software is easy to install and offers comprehensive encryption for hard drives and removable media.
Enable secure access through various authentication methods in the pre-boot environment, including MFA via Bluetooth low energy, hardware keys and more. SecureDoc seamlessly integrates with existing infrastructure while managing profiles, interacting with Active Directory and providing tools for password recovery and encryption key management.
Learn more about SecureDoc Disk Encryption
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
VPN and Zero-Trust Network Access (ZTNA) solutions to easily secure your business network assets and set up secure remote access.
Learn more about UTunnel VPN
UTunnel Secure Access provides Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This allows businesses to set up secure remote access for employees and ensures encrypted connectivity between corporate networks, data centers, offices, VPCs, IoT devices, or standalone hosts. UTunnel facilitates blazing-fast VPN server deployments, web-browser-based agent-less resource access, and policy-based user and team access management, letting you manage remote access with ease.
Learn more about UTunnel VPN
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Securing your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.
Learn more about 1Password
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Meet the database challenges of next gen web, cloud, & communications services with uncompromising scalability, uptime and scalability
MySQL is fast, reliable, scalable, and easy to use. It was originally developed to handle large databases quickly and has been used in highly demanding production environment.
MySQL Products:
MySQL HeatWave, our fully managed database service, for OLTP, OLAP, & ML workloads.
MySQL Enterprise Edition for delivering business-critical, enterprise database applications.
MySQL Enterprise Edition for ISVs, OEMs and VARs who want a proven, low cost, embedded database.
Learn more about MySQL
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cybersecurity to prevent data breaches for organizations with 250+ employees, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control.
Learn more about ESET Endpoint Security
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time.
Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history. Folder Lock is the most downloaded file-security application with more than 55 million users. It works on 32-bit and 64-bit versions of Windows 8, 7, Vista, XP.
Learn more about Folder Lock
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network.
Learn more about Symantec Endpoint Security
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Keeper Security is transforming the way people and organizations around the world secure their passwords, secrets and confidential info
Keeper’s easy-to-use cybersecurity platform is built with zero-trust and zero-knowledge security to protect every user on every device. Trusted by millions of individuals and thousands of organizations, Keeper is the leader for password management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
Learn more about Keeper Security
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cloudflare Inc. is a web performance and security company on a mission to build a better Internet.
Cloudflare Inc. is the leading web performance and security company helping to build a better Internet. Today the company runs one of the worlds largest networks (of more than 100 data centers) that powers more than 10 trillion requests per month. This is nearly 10% of all Internet requests, impacting more than 2.5 billion people globally.
Learn more about Cloudflare
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
TunnelBear for Teams is the easiest way your team can work securely and privately from anywhere.
When TunnelBear is turned On, your internet connection gets secured with AES-256 bit encryption and your public IP address gets switched to the country of your choice.
Businesses rely on TunnelBear for:
Securing remote and traveling employees
Global quality assurance testing
Gathering competitive intelligence
Stealthfully conducting market research
Accessing geo-restricted business tools
Businesses have access to priority support and a personal account manager.
Learn more about TunnelBear
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
The secure file sharing and storage solution built for business. Featuring state-of-the-art, compliance-supporting security.
Take productivity to the next level with ShareFile. Securely send, share, get feedback, approvals and even e-signatures on any file, fast. Business-class file sharing meets real-time collaboration to accelerate productivity with automated workflows you customize and control. Give real-time feedback, request approvals, co-edit—even get legally binding e-signatures seamlessly—on any device. Plus, with real-time tracking, you always know exactly where things stand. Using SSAE 16 Type II certified
Learn more about ShareFile
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control.
WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day.
Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture.
Try a free Trial of WebTitan today, full support included.
Learn more about WebTitan
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Endpoint data loss protection and security platform that enables small businesses to manage recovery of deleted files and more.
Endpoint data loss protection and security platform that enables small businesses and organizations to recover lost data caused through human error, ransomware or any other online disaster, where the recovered files can be tracked through status reports.
Learn more about CrashPlan
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Prevent major issues, adapt quickly, and be ready for anything with unified security and observability, powered by AI.
Splunk is the key to enterprise resilience. Trusted by the world’s leading organizations to keep their digital systems secure and reliable, Splunk can prevent major issues, absorb shocks, and accelerate transformation. With visibility into all your digital systems, you can respond to incidents before they have bigger business impacts. Take the next steps to make your organization more resilient with the all-in-one unified security and observability platform.
Learn more about Splunk Enterprise
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Enables you to detect and block malware providing real-time threat intelligence and complete web, device, and data control.
Sophos Intercept X is the worlds most comprehensive next-generation endpoint
protection solution built to stop the widest range of attacks. Intercept X
combines multiple techniques including signatureless exploit prevention, deep
learning malware detection, anti-ransomware capabilities, root cause analysis,
and more.
Learn more about Intercept X Endpoint
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats.
Multi-vector protection against viruses and malware offering full protection against all of today's sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats. Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data. No need to worry about or run updates, cloud-driven security means endpoints are always up to date.
Learn more about Webroot Business Endpoint Protection
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cybersecurity solution that provides with licensing options to fit the protection needs of businesses, datacenters, and public cloud.
GravityZone is built from the ground up for virtualization and cloud to deliver business security
services to physical endpoints, mobile devices, virtual machines in private, public cloud and Exchange
mail servers.
GravityZone Enterprise Security provides flexible licensing options to fit the protection needs of your offices, datacenters and public
cloud. All security services are delivered from one virtual appliance to install on premise covering all endpoints across your environment.
Learn more about Bitdefender GravityZone
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Enforce full disk encryption (FDE) for Windows and macOS devices, regardless of location, to ensure that in a worst case scenario, cybercriminals can’t access your sensitive company data. Further secure your organization by enabling MFA or SSO to deter attacks.
Learn more about JumpCloud Directory Platform
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Self-hosted secure remote access solution to your private network, in the cloud or on-prem.
OpenVPN Access Server is a full-featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.
Learn more about Access Server
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Desktop email client that supports easy-to-use PGP & S/MIME email encryption. Create PGP keypairs, upload and lookup public keys.
eM Client is a desktop email app designed to help individuals and businesses with secure email communication, daily agenda, upcoming (online) events, collaboration with colleagues and more, all in a unified clean interface. The app supports email encryption and digital signatures (PGP,S/MIME) including eM Keybook service to share public PGP keys. Lookup is also available for Proton.me and keys.openpgp.org. You can also easily create new PGP/GPG Keypair directly in eM Client.
Learn more about eM Client
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Bitwarden is an open source password manager that enables users to securely store and share sensitive data with end-to-end encryption.
With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
Learn more about Bitwarden
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Industry-leading data protection helps businesses of all sizes through data encryption, compliance, file management and cloud backup.
Industry-leading data protection system which helps businesses of all sizes through data encryption, compliance, file management and cloud backup. Protect against accidental deletion, theft, hardware failure, and data corruption. Restore data following a ransomware attack without paying ransom and retain business data to meet compliance requirements. Automatic backup, with award winning support makes data protection seamless.
Learn more about Carbonite
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
GoAnywhere is an enterprise-level solution that helps to encrypt files transfers and meet compliance requirements. Request a demo.
Encrypt enterprise-level file transfers with Fortra's GoAnywhere.
Protect organization's files at rest and in motion, while meeting compliance mandates, state privacy laws, and federal regulations such as HIPAA, SOX and more.
Join the more than 3,000 organizations worldwide that rely on the security and encryption delivered by GoAnywhere.
Request a free demo today.
Learn more about GoAnywhere MFT
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Citrix Workspace is a unified, secure & intelligent digital workspace that organizes & guides work & transforms employee experience.
Citrix Workspace is the digital workspace solution - a unified, secure, intelligent work platform that organizes, guides, and automates the most important details users need to make timely decisions and collaborate with others. A customized interface organizes essential data, tasks, and tools into a personalized flow so users can focus on their work and increase employee productivity and engagement. No more switching from app to app or sifting through irrelevant information and activities.
Learn more about Citrix Workspace
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software
Cypherdog's Encryption solution provides complete email protection by encrypting all email messages and attachments.
Cypherdog Encryption (CE) encrypts and decrypts any text or any media which you can send by any medium including e-mail or other platforms like Google Drive, Dropbox or Wetransfer.
You can use CE with Gmail on the most popular browsers, Thunderbird and Outlook. With just one click, you can use Cypherdog to encrypt e-mail messages and attachments.
CE is based on asymmetric encryption and prevent against data leaks and support cybersecurity policies.
Learn more about Cypherdog Encryption
...
Read more
Features
- Access Controls/Permissions
- Policy Management Software
- Compliance Management
- Password Manager Software