![]() Ĭoncealer (opens in new tab) is a file encryption program specifically for Apple Mac computers. Read our full Secure IT review (opens in new tab). It runs on all versions of Windows (32-bit as well as 64-bit).Ī master password is required to access any files, which can be a little limiting if you'd prefer to have different passwords for different files, not least if you're looking to share some of them with family and/or friends. Secure IT 2000 offers file and folder encryption, compression and file shredding all in one with command line processing and secure emails. This means that it may take a little longer than some other programs, but it does mean your files are potentially more manageable after. Secure IT from Cypherix is a file encryption program that also compresses your files. Read our full AxCrypt encryption tool review. There is a free version but it's very limited and perhaps best thought of as a way to trial the software and help become used to the interface and basic functions. As well as this, there’s passport management, and you can access your encrypted files through a smartphone app. There are also cloud storage capabilities thrown into the mix – the software will automatically protect files saved on services such as Google Drive and Dropbox.ĪxCrypt is fully multilingual, and it can work with languages such as Dutch, French, German, Italian, Korean, Spanish, Swedish, Russian and Portuguese – with more support planned for the future. It provides strong security, with files protected by either 128-bit or 256-bit AES encryption, which should thwart any intruders. The software has been designed specifically for individuals and small teams within businesses. While free software can be convenient for some, it’s not always as powerful as premium offerings, and AxCrypt is a good bet if you want something reliable. This is great because OneDrive works really well as a small business and personal cloud storage solution, so the ability to encrypt files is a great bonus.Īdditionally, OneDrive is an excellent choice for anyone who is committed to using Microsoft's services, as it offers neat integration with, the company's popular email platform, for instance. OneDrive also ties in nicely with Windows and there is a selection of reasonable mobile apps to facilitate access on the move.įor personal use, pricing starts at around $7 / £6 / AU$10 per month or $70 / £65 / AU$100 yearly.+ However, while the default is for only you to be able to access them, there is the option to share specific files (opens in new tab) and folders with other users. You can choose which files and folders to include, and these will become locked and encrypted. Filesystems: What filesystems are supported.Microsoft OneDrive may not be the first option that comes to people's minds when they think of encryption software, but what a lot of people don't realize is that it comes with its own secure and encrypted file storage area in the form of the Personal Vault.Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of.Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.Multiple keys: Whether an encrypted volume can have more than one active key.Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords. ![]() Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption.TrueCrypt License Version 3.0 (legacy code only) Trend Micro Endpoint Encryption (Mobile Armor) PGP Corporation (acquired by Symantec in 2010) NetLib Encryptionizer (directory encryption) Source Auditable for Commercial Customersĭustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) This is a technical feature comparison of different disk encryption software.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |