Encryption software Product List and Ranking from 11 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Encryption software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. フォーカスシステムズ Tokyo//Information and Communications
  2. オーク情報システム 本社、大阪事業所 Tokyo//others
  3. クリプトソフトウエア 本社 Niigata//others
  4. サイエンスパーク Kanagawa//Information and Communications
  5. 5 ピコテクノロジーズ Tokyo//Service Industry

Encryption software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. 『C4U Enterprise』 フォーカスシステムズ
  2. 【Security Measures】Easy-to-use and inexpensive file encryption software オーク情報システム 本社、大阪事業所
  3. Crypto Software Next-Generation Electronic Filing SEA クリプトソフトウエア 本社
  4. 『FP Pro.』 フォーカスシステムズ
  5. Prevent information leakage with file encryption software. 飛天ジャパン

Encryption software Product List

1~15 item / All 15 items

Displayed results

【Security Measures】Easy-to-use and inexpensive file encryption software

A trump card for encryption that supports work styles in the new normal era! Encryption software with a master key.

"CyberCrypt Ver.5.1" is file encryption software with a master key that prevents encryption forgetfulness and ensures thorough security measures. The number of scenarios handling important information outside the company or in the cloud is increasing. It is essential to encrypt and protect important files. Encrypting important files without the user's awareness. Achieve cost reduction and efficiency with simple operations. 【Features】 ■ Avoid information leakage risks without burdening users ■ "Master Key" for peace of mind even if the encryption password is forgotten ■ Reduce operational costs without the need for a password management server ■ Ensure safety and security in the new normal work style through encryption - For telework, remote work, or on cloud storage *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It solves issues such as "I want to keep my files private, but I want everyone to be able to use the files on the server" and "I'm worried about personal management of USBs." 【Features】 ■ Windows login with USB key ■ Distinction between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view the encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if the data falls into the hands of a third party, its contents cannot be read. [Contents] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email digital signature and encryption software 'SPIS-BOX'

Prevent email spoofing, tampering, and eavesdropping! High-reliability email solution.

"SPIS-BOX" is software that allows you to add electronic signatures to your emails and encrypt them simply by integrating it with your current email environment. As a gateway-type solution, it works seamlessly with Microsoft 365, Google Workspace, your own mail server, or rental servers, significantly enhancing the reliability of emails without being dependent on the user. [Features] ■ Prevents forgetting to add electronic signatures and encryption leaks through automation ■ Centralized management of electronic certificates at the gateway ■ Achieves advanced email solutions by integrating with various email services *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

SQLite-Encryption-Extension

Support for four different encryption algorithms, including RC4, AES-128 in OFB mode, and AES-128 in CCM mode.

The "SQLite Encryption Extension" is an add-on for the public domain version of SQLite that allows applications to read and write encrypted database files. The version of SQLite that includes this product can not only read and write encrypted files but also read and write regular database files created using the public domain version of SQLite. Applications can use the SQLite ATTACH command to communicate with two or more encrypted and/or unencrypted databases simultaneously. 【Product Overview】 ■ Type: Shareware ■ Language: English *For more details, please refer to the PDF documentation or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Information Security Product: CFKeeper

Safe and low-cost! Strengthening cloud storage security from the endpoint.

"CFKeeper" enhances the security of endpoints that utilize cloud storage. Files in the sync folder are automatically encrypted. Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual. It safely and cost-effectively addresses issues such as "leakage of sync folder/cache data during targeted attacks or malware infections" and "hard disk extraction when a PC is lost." 【Features】 ■ Prohibits copying/uploading to locations outside the cloud storage sync folder ■ Automatically encrypts files within the sync folder ■ Limits file storage to cloud storage ■ Files synchronized/uploaded to cloud storage are not encrypted, allowing for viewing on the go and sharing with external parties as usual *For more details, please refer to the related link page or feel free to contact us.

  • Other security systems
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Robust security measures: Utilization of automatic encryption features / Sendai City Hall

Introducing examples that have made significant contributions to enhancing information security! Achieving high security with minimal burden on users. *Trial version available.

In Sendai City, management personnel from each department serve as information managers, overseeing the proper operation and management of information security. However, prompted by a notification from the Ministry of Internal Affairs and Communications, a stricter policy regarding the handling of electronic data containing personal information has been established for the entire city of Sendai. As a result, we have introduced the file encryption software 'CyberCrypt' provided by our company. Consequently, encryption is automatically completed simply by placing files into a folder, just like operating a regular Windows PC, allowing users to maintain a high level of information security with minimal burden. 【Case Study】 ■Challenges - Responsibility as an administrative agency handling personal information - Moving away from security management dependent on the field - Strengthening security measures for all information containing personal data ■Effects - Development of an environment that meets increasing demands for information security - Utilization of an automatic encryption feature that staff can operate with minimal burden - Expansion of encryption efforts to confidential data that does not contain personal information *If you would like a trial version, please indicate "trial version consideration" in the [Contact Us] section. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of file encryption technology for the manufacturing industry is currently available.

Attention those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.

At our company, which handles file encryption software and security systems, we are currently offering materials that explain file encryption technology for the manufacturing industry. We discuss security measures in environments that handle design drawings, such as CAD, concerns when using encrypted files in China, and the necessity of controlling printing and screen capturing. 【Contents】 ■ Advantages of file encryption technology ■ Functions and features of products necessary for encryption operations ■ Strengthening security and improving operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems
  • Other CAD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CAD/CAM compatible transparent file encryption software available for use in China!

[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!

IP-guardV+ is a next-generation file encryption product that is location and application agnostic. It allows files to be used in an encrypted state without awareness from the moment they are created until they are deleted, in various scenarios such as internal/external, offline/online, thin client/fat client, and domestic/international. Additionally, it supports various Windows applications, including CAD/CAM systems, enabling the protection of not only general document files but also files that are highly important to businesses from leakage. 【Summary of Features】 ○ Measures against information leakage both internally and externally ○ Usable globally (including China) ○ Adopts a unique encryption engine that minimizes operational delays ★ Currently, you can also download the detailed explanation of basic security measures in the document titled 【Information Leakage Countermeasures Necessary for Manufacturing Sites: Manufacturing Industry Edition】. For more details, please download the catalog or contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Crypto Software Next-Generation Electronic Filing SEA

Document management of digital information

Storage of all electronic information With the data from that time left as is Easy generation management

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to "Secure Doc"

Protecting data with secure encryption solutions from the cloud to client PCs.

"Secure Doc" protects data from unauthorized use by encrypting the entire HDD/SSD. It requires authentication before the operating system of the encrypted device boots up. It detects the number of failed authentication attempts, and if the specified number of failures occurs, the PC becomes unbootable. Additionally, it can encrypt the entire drive of Windows tablets, allowing users to take advantage of the tablet's convenience while enhancing security. [Features] ■ Control of PC booting through pre-boot authentication ■ Flexible operational forms ■ Usable on tablet devices ■ Rich feature settings *For more details, please download the PDF or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『FP Pro.』

Easy operation with advanced security! The definitive encryption tool that can handle various situations.

"FP Pro." is a security application for Windows devices that ensures advanced security. Based on the powerful and fast encryption capabilities of CA FILE PROTECTOR, it has been equipped with new features to meet emerging needs. By creating encrypted files that can be decrypted simply by entering the encryption key, it allows the recipient to decrypt them even if they do not have FP Pro. 【Features】 ■ Main three functions of encryption, decryption, and secure deletion displayed as icons ■ Create encrypted files tailored to specific uses, such as compressing and encrypting or splitting and encrypting ■ Capable of setting encryption keys up to 65,536 bits in length ■ Secure key exchange functionality using public keys for safe transmission of encryption keys ■ Multi-user support allows management of key information for each user *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『CRYPTO RELAY』

For encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!

"CRYPTO RELAY" is a file encryption tool equipped with the domestically developed high-speed encryption technology C4S, boasting high security. Due to its simple commands, it can be easily integrated into routine operations. It is effective for addressing issues such as the protection of customer information during business outsourcing like invoicing and direct mail, as well as data protection for various outsourced computing tasks in accounting and finance. 【Features】 ■ Secure and easy file encryption ■ Supports encryption keys up to 65,536 bits ■ Fast encryption and decryption with minimal impact on business operations ■ Easy integration into Shel/JCL/CL through batch processing, allowing for use with minimal changes *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Leakage Countermeasures and Case Studies] Aflac Life Insurance (File Transfer)

Abolish the transfer of personal information on physical media such as CD-ROMs and USB drives! Significantly reduce the risk of leaks and the burden of media management!

To Aflac Life Insurance Co., Ltd., which provides insurance products and services, we would like to introduce a case study of the implementation of "Crypto Delivery." The company adopted our product as a more secure method for the transfer of customer information and other data, coinciding with the enforcement of the Personal Information Protection Law. They completely eliminated the use of CD-ROMs and USB drives, significantly minimizing the risk of information leakage while also achieving a substantial reduction in the operational burden of media management. [Key Points] - Complete elimination of data transfer via physical media - Reduced risk of information leakage and media management burden - Encryption features that meet the necessary security levels for insurance companies - Implementation of the AES encryption standard, which is the U.S. encryption standard *For more details, please refer to the PDF document or feel free to contact us.

  • Firewall
  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Corporate/Government-oriented ChatGPT service 'CHATMAN'

We provide our customers with safe and reliable services.

We offer the ChatGPT service "CHATMAN," which uses advanced data encryption AS-128/256. It features various pre-learning functions, including the ability to upload Office documents, specify multiple URLs for reading, and learn from YouTube videos. By using our service, you can enjoy convenient features without worrying about data leaks, thanks to top-level security measures. 【Features】 ■ Advanced data encryption using AS-128/256 ■ Pre-measures for penetration testing completed ■ Compatible with the latest versions of various middleware ■ Ability to upload Office documents *For more details, please download the PDF or feel free to contact us.

  • Chatbots

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration