File Encryption Software Product List and Ranking from 4 Manufacturers, Suppliers and Companies

File Encryption Software Product List

1~7 item / All 7 items

Displayed results

【Security Measures】Easy-to-use and inexpensive file encryption software

A trump card for encryption that supports work styles in the new normal era! Encryption software with a master key.

"CyberCrypt Ver.5.1" is file encryption software with a master key that prevents encryption forgetfulness and ensures thorough security measures. The number of scenarios handling important information outside the company or in the cloud is increasing. It is essential to encrypt and protect important files. Encrypting important files without the user's awareness. Achieve cost reduction and efficiency with simple operations. 【Features】 ■ Avoid information leakage risks without burdening users ■ "Master Key" for peace of mind even if the encryption password is forgotten ■ Reduce operational costs without the need for a password management server ■ Ensure safety and security in the new normal work style through encryption - For telework, remote work, or on cloud storage *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『C4U Enterprise』

Leave the file security of in-house servers and PCs to this one solution!

"C4U Enterprise" allows you to manage encrypted files on the server using a group key. It solves issues such as "I want to keep my files private, but I want everyone to be able to use the files on the server" and "I'm worried about personal management of USBs." 【Features】 ■ Windows login with USB key ■ Distinction between user key and group key (manual encryption/decryption) ■ Folder settings (automatic encryption/decryption) *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view the encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if the data falls into the hands of a third party, its contents cannot be read. [Contents] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Robust security measures: Utilization of automatic encryption features / Sendai City Hall

Introducing examples that have made significant contributions to enhancing information security! Achieving high security with minimal burden on users. *Trial version available.

In Sendai City, management personnel from each department serve as information managers, overseeing the proper operation and management of information security. However, prompted by a notification from the Ministry of Internal Affairs and Communications, a stricter policy regarding the handling of electronic data containing personal information has been established for the entire city of Sendai. As a result, we have introduced the file encryption software 'CyberCrypt' provided by our company. Consequently, encryption is automatically completed simply by placing files into a folder, just like operating a regular Windows PC, allowing users to maintain a high level of information security with minimal burden. 【Case Study】 ■Challenges - Responsibility as an administrative agency handling personal information - Moving away from security management dependent on the field - Strengthening security measures for all information containing personal data ■Effects - Development of an environment that meets increasing demands for information security - Utilization of an automatic encryption feature that staff can operate with minimal burden - Expansion of encryption efforts to confidential data that does not contain personal information *If you would like a trial version, please indicate "trial version consideration" in the [Contact Us] section. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Presentation of file encryption technology for the manufacturing industry is currently available.

Attention those concerned about the leakage of technical information! How can file encryption prevent information leaks such as CAD and drawings? Measures in China are also included.

At our company, which handles file encryption software and security systems, we are currently offering materials that explain file encryption technology for the manufacturing industry. We discuss security measures in environments that handle design drawings, such as CAD, concerns when using encrypted files in China, and the necessity of controlling printing and screen capturing. 【Contents】 ■ Advantages of file encryption technology ■ Functions and features of products necessary for encryption operations ■ Strengthening security and improving operational efficiency *For more details, please refer to the PDF materials or feel free to contact us.

  • Other security systems
  • Other CAD

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CAD/CAM compatible transparent file encryption software available for use in China!

[Presenting Materials!] Detailed explanation of necessary information leakage countermeasures and basic security measures for manufacturing sites!

IP-guardV+ is a next-generation file encryption product that is location and application agnostic. It allows files to be used in an encrypted state without awareness from the moment they are created until they are deleted, in various scenarios such as internal/external, offline/online, thin client/fat client, and domestic/international. Additionally, it supports various Windows applications, including CAD/CAM systems, enabling the protection of not only general document files but also files that are highly important to businesses from leakage. 【Summary of Features】 ○ Measures against information leakage both internally and externally ○ Usable globally (including China) ○ Adopts a unique encryption engine that minimizes operational delays ★ Currently, you can also download the detailed explanation of basic security measures in the document titled 【Information Leakage Countermeasures Necessary for Manufacturing Sites: Manufacturing Industry Edition】. For more details, please download the catalog or contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『CRYPTO RELAY』

For encryption measures for data exchange between general-purpose machines, UNIX, and WinglayS!

"CRYPTO RELAY" is a file encryption tool equipped with the domestically developed high-speed encryption technology C4S, boasting high security. Due to its simple commands, it can be easily integrated into routine operations. It is effective for addressing issues such as the protection of customer information during business outsourcing like invoicing and direct mail, as well as data protection for various outsourced computing tasks in accounting and finance. 【Features】 ■ Secure and easy file encryption ■ Supports encryption keys up to 65,536 bits ■ Fast encryption and decryption with minimal impact on business operations ■ Easy integration into Shel/JCL/CL through batch processing, allowing for use with minimal changes *For more details, please refer to the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration