---
description: Discover and compare Encryption Software Applications & Tools for Windows. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Encryption Software for Windows - Price comparison & Reviews - Capterra Singapore 2026
---

Breadcrumb: [Home](/) > [Encryption Software for Windows](https://www.capterra.com.sg/directory/30209/encryption/software) > [Page 4](https://www.capterra.com.sg/directory/30209/encryption/software?page=4)

# Encryption Software

Canonical: https://www.capterra.com.sg/directory/30209/encryption/software

Page: 4 / 4\
Prev: [Previous page](https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=3)

> Encryption software utilizes built-in encryption, cryptography, and policy controls to convert data in transit or at rest into ciphertext and prevent unauthorized access to digital information.

-----

## Products

1. [FTAPI](https://www.capterra.com.sg/software/132402/ftapi) (0 reviews) — FTAPI is the market leader in Europe for sensitive data workflows and automations. Using leading encryption technologies, these workflo
2. [Cornerstone MFT Server](https://www.capterra.com.sg/software/171254/cornerstone-mft-server) (0 reviews) — Cloud \&amp; on-premise tool that helps manage file transfer across servers with multi-layer security, collaboration \&amp; automation.
3. [EncryptRIGHT](https://www.capterra.com.sg/software/171730/encryptright) (0 reviews) — Enterprise software offering encryption key management, role-based access controls, audit logging, OpenPGP support and PGP key server.
4. [strongDM](https://www.capterra.com.sg/software/181859/strongdm) (0 reviews) — StrongDM secures and manages privileged access across any infrastructure with policy-based action control.
5. [PrivMX Fusion](https://www.capterra.com.sg/software/207925/privmx) (0 reviews) — All-in-one, privacy-by-design collaboration software protecting all data with end-to-end encryption on zero-knowledge servers.
6. [MeSign](https://www.capterra.com.sg/software/1011987/mesign) (0 reviews) — Email encryption solution auto-configures email certificates and encrypts corporate emails to keep them in ciphertext in the cloud.
7. [Symantec Encryption](https://www.capterra.com.sg/software/1018636/symantec-endpoint-encryption) (0 reviews) — Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance.
8. [CenterDevice](https://www.capterra.com.sg/software/1023397/centerdevice) (0 reviews) — CenterDevice is cloud-based software for the management of sensitive documents in accordance with the GDPR, GoBD, and C5 guidelines.
9. [LAN Crypt File and Folder Encryption](https://www.capterra.com.sg/software/1031379/conpal-lan-crypt) (0 reviews) — Protects personal, sensitive and business-critical data from unauthorized access.
10. [Dekart Private Disk](https://www.capterra.com.sg/software/1031999/dekart-private-disk) (0 reviews) — Hard disk encryption software that enables students, school staff, and corporate professionals to encrypt confidential data.
11. [CipherTrust Cloud Key Manager](https://www.capterra.com.sg/software/1034877/ciphertrust-cloud-key-manager) (0 reviews) — CipherTrust Cloud Key Manager (CCKM) enables management and encryption of keys across public or private clouds from a single console.
12. [Socializer Messenger](https://www.capterra.com.sg/software/1042267/socializer-messenger) (0 reviews) — The Socializer Messenger is a highly encrypted solution for internal communication combining security, privacy and business features.
13. [WorkBot](https://www.capterra.com.sg/software/1062632/workbot) (0 reviews) — AI-powered chatbot, chat agent, and voice agent that automate support, engage users, and boost business efficiency.
14. [TeraCryption](https://www.capterra.com.sg/software/1062709/teracryption) (0 reviews) — TeraCryption is a file encryption management system with unique security features to achieve HIPAA and CMMC compliance.
15. [Klarytee](https://www.capterra.com.sg/software/1062917/klarytee) (0 reviews) — Data-centric Governance Platform. Visibility. Protection. Control For AI \&amp; Beyond.
16. [Data Krypter](https://www.capterra.com.sg/software/1069075/Data-Kryptere) (0 reviews) — The Data Krypter is an encryption software that protects data by encrypting files, folders and text.
17. [DigiSecret](https://www.capterra.com.sg/software/1069239/DigiSecret) (0 reviews) — DigiSecret encryption software securely stores sensitive data by hiding generic files, pictures, and text within ordinary images.
18. [Xecrets Ez](https://www.capterra.com.sg/software/1070388/Xecrets-Ez) (0 reviews) — Xecrets Ez uses strong AES-256 encryption to protect files and text on Windows, macOS, and Linux.
19. [Confidencial](https://www.capterra.com.sg/software/1070748/Confidencial) (0 reviews) — Selective encryption and granular access controls become a part of the file's metadata, ensuring security follows your data everywhere.
20. [TDCompress](https://www.capterra.com.sg/software/1070956/TDCompress) (0 reviews) — Managed file transfer software that enables customers to compress, decompress, encrypt, and authenticate cross-platform data files.
21. [TDAccess](https://www.capterra.com.sg/software/1070958/TDAccess) (0 reviews) — TDAccess is a lightweight AS2 client with a user-friendly interface and command-line capabilities, trusted in over 100,000 deployments
22. [Proton Drive](https://www.capterra.com.sg/software/1076524/Proton-Drive) (0 reviews) — Proton Drive is a cloud storage software that provides secure file access and sharing with end-to-end encryption technology.
23. [MySecureFolder](https://www.capterra.com.sg/software/1083841/MySecureFolder) (0 reviews) — Cloud-based file protection software for Windows that uses AES-256-GCM encryption to block unauthorized access and copying.
24. [CyberGrant](https://www.capterra.com.sg/software/1072703/Remotegrant) (0 reviews) — Secure file sharing with persistent encryption, AI-driven classification, and full lifecycle control – even after download.
25. [ANKASecure](https://www.capterra.com.sg/software/1087030/ANKASecure) (0 reviews) — Crypto agility orchestration platform that separates applications from cryptographic execution — enabling quantum-ready transitions.

-----

Page: 4 / 4\
Prev: [Previous page](https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.capterra.com.sg/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.com.sg/directory/10005/computer-security/software)
- [File Sharing Software](https://www.capterra.com.sg/directory/30909/file-sharing/software)
- [Email Security Software](https://www.capterra.com.sg/directory/31358/email-security/software)
- [Endpoint Protection Software](https://www.capterra.com.sg/directory/30907/endpoint-protection/software)

## Links

- [View on Capterra](https://www.capterra.com.sg/directory/30209/encryption/software)
- [All Categories](https://www.capterra.com.sg/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Capterra Singapore helps find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.com.sg","url":"https://www.capterra.com.sg/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.com.sg/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":null,"url":"https://www.capterra.com.sg/","@type":"WebSite","@id":"https://www.capterra.com.sg/#website","publisher":{"@id":"https://www.capterra.com.sg/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.com.sg/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Encryption Software","description":"Discover and compare Encryption Software Applications & Tools for Windows. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.","url":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4","about":{"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#webpage","mainEntity":{"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#itemlist"},"isPartOf":{"@id":"https://www.capterra.com.sg/#website"},"inLanguage":"en-SG","publisher":{"@id":"https://www.capterra.com.sg/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Encryption Software for Windows","position":2,"item":"https://www.capterra.com.sg/directory/30209/encryption/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.capterra.com.sg/directory/30209/encryption/software?page=4","@type":"ListItem"}],"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Encryption Software for Windows - Price comparison &amp; Reviews - Capterra Singapore 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"FTAPI","position":1,"description":"FTAPI is the market leader in Europe for sensitive data workflows and automations. Using leading encryption technologies, these workflows are protected at all times - whether it concerns sending or receiving data, structured data input, sharing confidential information or secure automation.\n\nOver 2000 customers and more than 1 million active users trust in FTAPI.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/567c943e-b600-4340-a0e1-6f2eb3c936ca.png","url":"https://www.capterra.com.sg/software/132402/ftapi","@type":"ListItem"},{"name":"Cornerstone MFT Server","position":2,"description":"Cornerstone MFT offers secure file transfer & collaboration with multi-layer security, high availability & automation. PCI & HIPAA compliant, the Cornerstone solution offers point-to-point encryption, perimeter security & 2-factor authentication. Improving productivity while enhancing security, Cornerstone enables users to easily incorporate this highly secure solution into existing work processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/82141da4-7608-4c46-9aaa-643386ca91c1.png","url":"https://www.capterra.com.sg/software/171254/cornerstone-mft-server","@type":"ListItem"},{"name":"EncryptRIGHT","position":3,"description":"EncryptRIGHT includes a comprehensive, centralized encryption key management system for orchestrating all cryptographic keys related to data protection, including the ability to generate, exchange, distribute, store, rotate, temporarily suspend, revoke, and destroy cryptographic keys.\nKey lifecycle can be managed by setting key status to currently active, future effective key, or expired. Expired keys can be kept and used for verifying authenticated or signed data and decryption, but they can't be used to create new authentication codes, signatures or encrypt data. As needed, keys may be automatically deleted when expired or on a per-key configurable time afterwards.\nRole-based access controls can be used to identify what users have permission for key management, and all administrative actions are recorded in the audit log. It supports symmetric or asymmetric keys and allows multiple users to enter components for symmetric keys. It also includes support for OpenPGP and PGP key server.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/26d8b7be-cadd-4200-9928-14dd00d24d14.png","url":"https://www.capterra.com.sg/software/171730/encryptright","@type":"ListItem"},{"name":"strongDM","position":4,"description":"StrongDM is a policy-based Zero Trust privileged access management (PAM) solution that provides dynamic privileged action control for any type of infrastructure. It helps security teams stop unsanctioned actions while ensuring continuous compliance. Additionally, it facilitates streamlined reporting on user activity for IT, security, DevOps, and compliance teams via comprehensive audit logs. Supports all modern infrastructure, including databases, servers, Kubernetes clusters, clouds, and web applications. StrongDM combines authentication, authorization, networking, and observability into a single platform, providing secure and auditable access for the precise amount of time that access is needed.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc9c7ad6-1099-438c-a99e-e6c8710e321c.png","url":"https://www.capterra.com.sg/software/181859/strongdm","@type":"ListItem"},{"name":"PrivMX Fusion","position":5,"description":"PrivMX Fusion is all-in-one, privacy-by-design collaboration software for hybrid and remote teams, protecting all data with zero-knowledge encryption. It's user-friendly and intuitive, supporting creativity and offering a new approach to effective teamwork. With all necessary Tools integrated within one digital workspace,  it helps teams organise tasks, files and communication in a fresh new way, making it easier to look at projects from various angles and see the big picture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/664b1ee0-ea2e-446b-b659-e70a2fcc4760.png","url":"https://www.capterra.com.sg/software/207925/privmx","@type":"ListItem"},{"name":"MeSign","position":6,"description":"MeSign Email Encryption protects corporate emails securely hosted on their cloud or on their premises.  \n\n*Encrypt, digitally sign and timestamp every email by default automatically. \n\n*Integrate email certificates to organizations’ email environment easily. \n\n*Use Cloud Crytpgraphic Infrastructure by default.\n\n*Self-hosted Key Management System\n\n*Free to access MeSign Global Certificate Database for all organizations to retrieve public keys and send encrypted emails automatically in batch.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/27f5712a-3e49-48e6-a46a-725b506fe30f.jpeg","url":"https://www.capterra.com.sg/software/1011987/mesign","@type":"ListItem"},{"name":"Symantec Encryption","position":7,"description":"Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. Additionally, this solution supports BitLocker, File Vault, and Symantec encryption.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/710b266d-26ee-4080-9aa7-efabeebe42cc.jpeg","url":"https://www.capterra.com.sg/software/1018636/symantec-endpoint-encryption","@type":"ListItem"},{"name":"CenterDevice","position":8,"description":"CenterDevice is a business cloud service, which supports document management and complies with GDPR, GoBD, and C5 guidelines. Several functions are available for this purpose, including CenterLink, SmartArchive, and SmartVersion. CenterLink enables the secure exchange of documents via external links, SmartArchive is used to archive documents, and SmartVersion can be used to track changes. CenterDevice is designed to support teamwork.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e9149d4f-abd3-4ae6-a594-0380a0194518.png","url":"https://www.capterra.com.sg/software/1023397/centerdevice","@type":"ListItem"},{"name":"LAN Crypt File and Folder Encryption","position":9,"description":"u.trust LAN Crypt adds the extra-layer of security to your data. With its role-based access rights management it enables you to avoid external access (e. g. by attackers or external consultants with administrative rights) as well as unauthorized internal access (e. g. by network administrators) within your organization. Given that, it is the ideal solution to ensure compliant data management.\n\nThe cryptographic keys used to encrypt your data are solely stored in a central data base or in the key ring at the users’ local machine so you are 100% independent from the (cloud) providers you may use.\n\nOn top, u.trust LAN Crypt follows a strict role split approach: The network administrator can access and manage files and the security officer manages keys and security policies. This ensures a complete separation of network administration and security management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/371490df-3709-40c4-9129-e40e081847e3.png","url":"https://www.capterra.com.sg/software/1031379/conpal-lan-crypt","@type":"ListItem"},{"name":"Dekart Private Disk","position":10,"description":"Dekart Private Disk is a hard disk encryption tool available for business, personal, student, and educational use. Available in 16 languages, it caters to a global userbase of Windows users. The tool comes with NIST-certified 256-bit AES encryption and specializes in creating multiple encrypted disks for storing confidential data. Data is automatically encrypted when users write files on the assigned disk and then decrypted when read. It’s also monitored constantly by Disk Firewall to prevent malware. Applications not on the whitelist are denied access to encrypted information. Users can run it on USB sticks, external flash & hard drives, DVDs, and MP3 players without installing other applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3174518a-ba72-43a8-aa4d-081b30bb473d.jpeg","url":"https://www.capterra.com.sg/software/1031999/dekart-private-disk","@type":"ListItem"},{"name":"CipherTrust Cloud Key Manager","position":11,"description":"Reduce management complexity, increase efficiency, and maintain a high level of security across clouds with the CipherTrust Cloud Key Manager (CCKM). Whether public or private clouds or on-prem infrastructure, CCKM protects your data with a single pane of glass view. \n\nSimplify key management with a single user interface and a common set of APIs across clouds. CCKM offers vendor-independent encryption and robust compliance and reporting tools.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f86c2b5-6f22-459b-b283-26f06701d9f4.jpeg","url":"https://www.capterra.com.sg/software/1034877/ciphertrust-cloud-key-manager","@type":"ListItem"},{"name":"Socializer Messenger","position":12,"description":"The Socializer Messenger is a GDPR-compliant secure messenger for internal communication of companies and governments. \n\nIt's equipped with unique privacy features and military grade encryption for calls, conferences and chats. A built-in facial recognition hides confidential chats, contacts and folders when an intruder is identified by the front camera. By integrating a document scanner, PDF reader and file manager into the Messenger’s secure sandbox, all data is protected from external access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b1a452c5-52a5-4b6a-89e8-c15f0f526782.webp","url":"https://www.capterra.com.sg/software/1042267/socializer-messenger","@type":"ListItem"},{"name":"WorkBot","position":13,"description":"WorkBot is an AI-powered solution that combines chatbots, chat agents, and voice agents to automate customer support, qualify leads, and streamline workflows. Built for businesses of all sizes, WorkBot integrates seamlessly with your systems to deliver 24/7 assistance, reduce response times, and enhance user experiences across web, messaging apps, and voice platforms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9344195-c679-48b4-a81a-6a1555e993b4.jpeg","url":"https://www.capterra.com.sg/software/1062632/workbot","@type":"ListItem"},{"name":"TeraCryption","position":14,"description":"TeraCryption is a file encryption management system with unique security features to achieve HIPAA and CMMC compliance by managing and protecting sensitive files at rest and in transit.  \nTeraCryption allows you to quickly restore operations after a hacker attack, avoiding ransom payments. It blocks unauthorized individuals from accessing sensitive files. Encrypted files are automatically stored in centralized and secure group folders on the server, Google Drive, or MS OneDrive. \n\nIMPORTANT: You don't need encryption key management. Encryption and decryption occur automatically within seconds without human intervention for key management. There is no need to install software on the server; Explorer is the user interface, eliminating costly learning curves.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d2197beb-76ea-421f-a4d8-68d791975b81.jpeg","url":"https://www.capterra.com.sg/software/1062709/teracryption","@type":"ListItem"},{"name":"Klarytee","position":15,"description":"Klarytee Ltd is a data-centric governance platform for IT-enabled environments and AI systems. Built for government and regulated-sector organisations handling sensitive, legally privileged, or regulated data. \n\nThe platform operates directly on the data itself. It discovers and catalogues data across the data estate, identifies sensitive elements at fine granularity, and applies selective fragment-level encryption. Access and usage policies are cryptographically bound to protected data elements and enforced using least-privileged, need-to-know access for both human users and AI agents, including within RAG and other AI pipelines. These controls govern both AI inputs and AI outputs and persist as data is accessed, transformed, embedded, or shared. The platform provides continuous intelligence on data access, movement, and policy enforcement, supporting governance, audit, and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/03a49a84-7113-44a0-bcca-921800b31b94.png","url":"https://www.capterra.com.sg/software/1062917/klarytee","@type":"ListItem"},{"name":"Data Krypter","position":16,"description":"The Data Krypter is encryption software that allows users to securely encrypt files, folders, and blocks of text. Can also be used to send/receive encrypted emails. It uses symmetric or asymmetric encryption.  Symmetric uses the same secret key to encrypt and decrypt data using the PERNG quantum-safe algorithm. Asymmetric encrypts with a public key and decrypts with a private keys using the quantum-proof NTRU-2x2 algorithm. (A variant of NTRU proposed by Banks and Shparlinski.) When encrypting files or folders, users have the option to randomly rename them and/or securely erase the originals.\nThe software helps protect against ransomware attacks by encrypting sensitive data ahead of time.\nIt also encrypts master passwords, private keys, and secret keys so that encrypted data remains secure even if the computer is accessed. \nNo back door to your data.\nOne-time cost of $39.97US for the base version and $19.97US each for any modules.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/43b68b4d-d7fb-4579-bcd7-d00f12a9b45e.jpeg","url":"https://www.capterra.com.sg/software/1069075/Data-Kryptere","@type":"ListItem"},{"name":"DigiSecret","position":17,"description":"DigiSecret is encryption software that allows users to conceal confidential files, images, text, and more within a dummy image. The software encrypts the hidden data using the SHA256 algorithm before embedding it in the image, providing an extra layer of security. DigiSecret works offline so users can privately encrypt and embed files without transmitting data externally. The software aims to give individuals control over their privacy by enabling them to securely communicate sensitive information.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/949c5694-42a1-4d4c-ac05-3f5c28099369.png","url":"https://www.capterra.com.sg/software/1069239/DigiSecret","@type":"ListItem"},{"name":"Xecrets Ez","position":18,"description":"Xecrets Ez is a free, cross-platform desktop application for secure file encryption, available for Windows, macOS, and Linux.\n\nIt provides zero-knowledge AES-256 encryption with a simple interface, allowing users to encrypt and decrypt files quickly and safely.\n\nWhen encrypting, the original file is securely wiped to prevent data leakage.\n\nXecrets Ez works entirely offline—no cloud services or accounts are required—making it ideal for users who value privacy and control. \n\nThe app is compatible with the AxCrypt file format (.axx), ensuring access to older encrypted files.\n\nPremium features include YubiKey support for hardware-based security, Shamir’s Secret Sharing for distributed backup of secrets, and bulk encryption.\n\nBuilt on the open-source Xecrets Cli, Xecrets Ez provides transparency and trust, with all cryptographic operations handled locally on the user's device.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c14c5b23-31f9-418d-8860-616a3fffe478.png","url":"https://www.capterra.com.sg/software/1070388/Xecrets-Ez","@type":"ListItem"},{"name":"Confidencial","position":19,"description":"Our technology differs from typical ‘all or nothing’ solutions by allowing precise control over what gets encrypted and who gets access. Selective encryption for sensitive data within documents enhances security and productivity by leaving the rest of the document accessible to other stakeholders.\n\nConfidencial goes beyond file-level access controls, offering granular protection at the data level. With our fine-grained access controls and patented selective encryption, you can encrypt and control access down to the specific data points and data fields in a document. This approach fortifies security while maximizing the utility of non-sensitive information for stakeholders and LLMs. \n\nConfidencial embeds encryption and security controls within the documents’ metadata, ensuring security remains intact no matter how documents are shared or stored. With Confidencial, nothing gets in the way of collaboration, innovation, and productivity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/29a59fcd-c39a-4547-9b98-577bacbfc2ea.jpeg","url":"https://www.capterra.com.sg/software/1070748/Confidencial","@type":"ListItem"},{"name":"TDCompress","position":20,"description":"bTrade’s TDCompress offers robust security for managed file transfers with cross-platform compression, encryption, and authentication.  This versatile platform compresses and encrypts data files for seamless transfers over any network and pairs effortlessly with TDXchange’s suite of endpoints to meet your specific file transfer needs.\n\nKey Features of TDCompress\n\nEfficient File Compression: Combine multiple files into a single compressed file for easy transmission. Decompression then splits the data back into its original separate files.\n\nEDI Compatibility: TDCompress can compress and decompress x12, EDIFACT, UN/TDXchange, and UCS EDI data, while keeping EDI envelope records in clear text for routing through a value-added network (VAN).\n\nAdvanced Security: Utilize state-of-the-art public key technology for encryption and digital signatures, employing the latest algorithms to ensure data security.\n\nCross-Platform Interoperability: Built-in options facilitate cross-platform usage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/64ad6202-5f83-49cb-8116-2eb4c9569268.png","url":"https://www.capterra.com.sg/software/1070956/TDCompress","@type":"ListItem"},{"name":"TDAccess","position":21,"description":"TDAccess stands out as the most widely used EDI AS2 endpoint in the Americas, thanks to its top-tier cross-platform compression and transmission capabilities.  Operating seamlessly across multiple platforms—such as Windows, Linux, AS400/iSeries, and MVS/zSeries—TDAccess provides a safe and secure method for trading partners to communicate and ensures smooth interoperability with various trading communities, IP gateways, private portals, public marketplaces, and EDI VANs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f99324de-2625-48ae-974a-e946b1dda267.png","url":"https://www.capterra.com.sg/software/1070958/TDAccess","@type":"ListItem"},{"name":"Proton Drive","position":22,"description":"Proton Drive is a cloud storage software that provides end-to-end encrypted file storage services. The platform features secure document collaboration capabilities, allowing users to create, edit, and share documents while maintaining privacy protection through encryption. \n\nProton Drive offers file sharing functionality with optional password protection and expiring links and includes automatic backup systems that store data across multiple datacenters for continuous accessibility. Users can store various file types including documents, photos, and videos, with free accounts receiving storage allocation and paid plans offering expanded capacity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f7735ddb-6c74-4018-94d2-ea100786a8ff.png","url":"https://www.capterra.com.sg/software/1076524/Proton-Drive","@type":"ListItem"},{"name":"MySecureFolder","position":23,"description":"Windows security software that protects files and folders using AES-256-GCM encryption and Argon2id password hashing. The software implements dual-layer security by combining password protection with Wi-Fi network verification, allowing access only when connected to pre-approved networks. It features automatic backups for data recovery and export/import functionality for transferring protected folders between devices. MySecureFolder includes activity logging to track folder access and offers two recovery options: offline recovery keys and email-based verification. The interface supports dark mode and follows modern design principles. The application employs industry-standard cryptographic techniques including authenticated encryption and secure key derivation to maintain file security at the file system level.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0c41713e-a9d0-4934-80f3-3701cc636b8b.jpg","url":"https://www.capterra.com.sg/software/1083841/MySecureFolder","@type":"ListItem"},{"name":"CyberGrant","position":24,"description":"CyberGrant delivers AI-driven cybersecurity solutions for data protection and secure file sharing. Its flagship platform, FileGrant, is an enterprise-grade secure file sharing and encryption solution designed to protect sensitive data across its entire lifecycle.\n\nFiles are encrypted natively at creation or upload, automatically classified through a private AI engine, and governed by persistent controls that remain active even after download.\n\nUnlike traditional DLP or standard EFSS tools, FileGrant keeps security attached directly to the file, ensuring continuous protection across cloud, on-premise, and hybrid environments, as well as with third parties and remote users. Organizations gain granular audit trails, secure external collaboration, anti-screenshot viewing, and automated policy enforcement without burdening end users.\n\nWith FileGrant, companies replace risky link-based sharing with a true Zero Trust vault for documents, improving compliance, reducing human error, and prevent","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1781dc5c-5854-4816-a56a-e13c763a181c.png","url":"https://www.capterra.com.sg/software/1072703/Remotegrant","@type":"ListItem"},{"name":"ANKASecure","position":25,"description":"ANKASecure©  is a crypto agility orchestration platform that structurally separates applications from cryptographic execution. Instead of hardcoding algorithms into application code, applications reference cryptographic identities — ANKASecure© resolves algorithm family, hybrid configuration, lifecycle state, and policy constraints dynamically at runtime.\nThis means cryptographic transitions become policy updates, not engineering projects. Organizations can migrate from classical to post-quantum cryptography at their own pace, application by application, without exposing plaintext or rewriting code.\nKey capabilities include: 125+ algorithms across 21+ families (classical, hybrid, and post-quantum); centralized policy-driven governance; seamless legacy modernization via REST APIs, Java SDK, and CLI; multi-tenant isolation with HSM-backed key protection; and support for 14+ international standards including NIST, BSI, ANSSI, ETSI, and KISA. Deploy as SaaS, on-premise, or air-gapped.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6f0769f8-8250-49d2-822f-e290bf07ddaa.png","url":"https://www.capterra.com.sg/software/1087030/ANKASecure","@type":"ListItem"}],"@id":"https://www.capterra.com.sg/directory/30209/encryption/deployment-options/windows/software?page=4#itemlist","numberOfItems":25}
</script>
