The document lists various encryption tools, highlighting their key features and encryption capabilities. Tools mentioned include IBM Security Guardium for centralized management, AxCrypt Premium for AES encryption, and NordLocker for enhanced security with 4096-bit encryption. Other tools like Kruptos 2, Boxcryptor, and Eset DESlock offer a range of encryption solutions for data protection and management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
1 views1 page
Encryption Tools
The document lists various encryption tools, highlighting their key features and encryption capabilities. Tools mentioned include IBM Security Guardium for centralized management, AxCrypt Premium for AES encryption, and NordLocker for enhanced security with 4096-bit encryption. Other tools like Kruptos 2, Boxcryptor, and Eset DESlock offer a range of encryption solutions for data protection and management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Encryption tools
IBM Security Guardium Data Encryption - centralized key and
policy management,
AxCrypt Premium - support more comprehensive solutions. It can
support both 128-bit and 256-bit AES encryption and files
VeraCrypt - encrypts data and creates partitions in your network
based on volume size
NordLocker - provides 256-bit AES encryption, which is enough to
secure most data, but where it shines is the inclusion of 4096-bit encryption. If 256-bit doesn’t quite give you peace of mind, 4096-bit surely will.
Kruptos 2 - AES 256-bit encryption
Boxcryptor - provides a combination of AES and RSA (Rivest–
Shamir–Adleman) end-to-end encryption for 30 different cloud services.
Eset DESlock – DES lock Encryption by ESET, remote device wipe,
simplified key sharing and encryption policy setting and enforcement. Centralized management delivers the ability to control devices anywhere in the world.
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging