Search (2)
  • There are no suggestions because the search field is empty.

Knowledge

04 August 2017
Information Security

10 Essential File Encryption Tools

10-Essential-File-Encryption-Tools.jpg

 

Secure data storage is essential for any business holding valuable information. Whether it be employee records, customer contact information or sensitive project documents, companies must be proactive in protecting their information assets to avoid financial and legal liabilities.

The following 10 file encryption tools offer a great defence against poor information security.

 

1. AxCrypt

AxCrypt features;

  • Uses the 128-bit and 256-bit AES - the strongest file encryption algorithm technology.
  • Password generator that allows you to create complex passwords for all of your accounts, and also to manage these from the one place.
  • Offers secure cloud storage and mobile access, allowing you to store encrypted files on the cloud and access them via mobile devices.
  • Collaboration feature that allows you share encrypted files with other ACrypt users.
  • Secured folder and file wipe functions, enabling you to encrypt an entire folder at a time. The file wipe function allows you to completely delete files from your system.

 

2. InterCrypto Advanced Encryption Package

InterCrypto is a feature-rich data encryption tool, including;

  • Encrypts your files using 20 encryption algorithms including the well-known AES 256-bit.
  • Securely deletes your sensitive files with 20 wiping algorithms.
  • The file shredder complements encryption by ensuring the privacy of your files.
  • To avoid your keystrokes being recorded, it has a built-in virtual keyboard that you can use, and clear your typing history.
  • Compresses files as it encrypts saving you storage space.
  • Allows password protected self-decrypting versions of your files to be sent via email.
  • You can also encrypt text messages. It has a text encryption assistant to encrypt important messages sent via email.

 

3. Folder Lock

Folder Lock includes a full suite of encryption tools;

  • Let’s you conceal your important documents and files.
  • Offers AES-256 military-grade encryption.
  • Protects USB, CD & email attachments, by executing lockers in these locations.
  • The password wallet can be used to save all your sensitive information securely. This includes passwords, credit and debit card details.
  • A comprehensive file shredding system.
  • A stealth mode that prevents you from leaving digital footsteps.

 

4. CertainSafe Digital Safety Deposit Box

CertainSafe is an industry-leading provider, featuring multiple layers of encryption security; 

  • Files are encrypted with a two part key, one part held by you the other by CertainSafe. This ensures a zero knowledge system.
  • Uses MicroEncryption where encrypted data is split into chunks that are stored in different servers and hard drives.
  • Secure login process, which authenticates you to sites and authenticates sites to you.

 

5. CryptoForge

CryptoForge is a less sophisticated solution to file protection, including; 

  • Uses the 256-bit key AES encryption technology.
  • Has a decrypter app allowing you to send encrypted files by email to anyone.
  • Provides three other algorithms for your use 448-bit Blowfish, 168-bit Triple DES and 256-bit GOST.
  • It offers a file shredder to get rid of sensitive data.
  • Has a password strength meter and password generator.

 

6. Secure IT

The Secure IT software is accessible to anyone, yet also has some powerful features;

  • Compresses files better than other encryption software.
  • Gives you a choice between 256-bit key and 448-bit key algorithm which are equally good if passwords are strong.
  • Ensures safe shredding of files by overwriting with randomised data.

 

7. VeraCrypt

VeraCrypt by IDRIX is an open source free disk encryption software to protect your system, folders and files.

  • Supports AES, TwoFish and serpent encryption cyphers.
  • Performs on-the-fly-file encrypted volumes.
  • Plausible deniability that allows a single hidden volume to be created within another volume.
  • Hidden operating system; can create an operating system whose existence may be hard to prove.

 

8. Steganos Safe 18

Steganos Safe 18 protects sensitive files by use of encrypted, portable cloud safes. It includes;

  • Safes for storing your sensitive documents.
  • Portable safe that can only be accessed when you need it.
  • Cloud safe to share encrypted files between PCs.
  • Comprehensive encrypted storage in containers for your sensitive files.

 

9. Kruptos 2

Kruptos 2 is another popular encryption tool that’s easy to use and keeps your files secure.

  • Employs AES 256-bit encryption.
  • A file shredder that overwrites and deletes sensitive data.
  • Password strength meter.

 

10. Cypherix PE

Cypherix PE creates an encrypted container with a simple drag and drop interface.

  • Operates on 448-bit implementation of the Blowfish algorithm in a cypher block chaining mode with a block size of 64-bits.
  • Has a secure deletion tool for added security.
  • You can create one or more encrypted volts.
  • You can send encrypted files to people without Cypherix PE.

 

File encryption is an important measure in protecting your company information, however it’s only one part of the puzzle. An information security management system compliant with ISO 27001 will provide your business with the framework it needs to safeguard its information assets long into the future.

To learn more about the information security threats facing Australian companies, download our free whitepaper below:

Information Security and Australian businesses

Bottom Form Image (2)

Request a Complimentary Consultation