Syxsense vs Cypherdog Encryption
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$5.00/year
- Free Version
- Free Trial
- Subscription
Starting from
US$6.00/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.5/ 5Features
4.5/ 5Customer Service
4.6/ 5Value for Money
4.6/ 5Ease of Use
4.7/ 5Features
4.7/ 5Customer Service
4.6/ 5Value for Money
4.7/ 5Features
Total features 122
- API
- Access Controls/Permissions
- Active Directory Integration
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- App Management
- Application Management
- Application Security
- Approval Process Control
- Assessment Management
- Asset Discovery
- Asset Tracking
- Audit Management
- Audit Trail
- Authentication
- Automated Containment
- Automatic Patch Deployment
- Automatic Scans
- BYOD Management
- Backup and Recovery
- Behavioral Analytics
- Chat/Messaging
- Cloud Encryption
- Compliance Management
- Compliance Tracking
- Configuration Management
- Customizable Branding
- Customizable Fields
- Customizable Forms
- Customizable Reports
- Customization
- Dashboard
- Data Classification
- Data Import/Export
- Data Leak Prevention
- Data Security
- Data Visualization
- Deployment Management
- Device Management
- Diagnostic Tools
- Drag & Drop
- Email Attachment Protection
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- File Encryption
- File Sharing
- File Transfer
- HIPAA Compliant
- IT Asset Tracking
- IT Reporting
- Intellectual Property Protection
- Inventory Management
- Issue Auditing
- Issue Management
- Key Management
- License Management
- Maintenance Management
- Maintenance Scheduling
- Mobile Content Management
- Mobile Device Management
- Monitoring
- Multi-Channel Communication
- Multiple User Accounts
- Network Scanning
- Network Wide Management
- P2P Encryption
- PCI Compliance
- Password Management
- Password Protection
- Patch Management
- Patch Prioritisation
- Patch Testing
- Performance Metrics
- Phishing Protection
- Policy Management
- Prioritization
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Remote Access & Monitoring
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Remote Update/Installation
- Reporting & Statistics
- Reporting/Analytics
- Risk Analysis
- Risk Assessment
- Risk Management
- Runtime Container Security
- SQL Injections
- SSL Security
- Scheduling
- Screen Sharing
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Session Recording
- Session Transfer
- Single Sign On
- Source-Code Scanning
- Status Tracking
- Summary Reports
- Support Ticket Management
- Surveys & Feedback
- Task Management
- Third-Party Integrations
- Threat Protection
- Ticket Management
- Two-Factor Authentication
- Unattended Access
- Usage Tracking/Analytics
- User Management
- Virus Definition Update
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Workflow Management
Total features 25
- API
- Access Controls/Permissions
- Active Directory Integration
- Activity Dashboard
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- App Management
- Application Management
- Application Security
- Approval Process Control
- Assessment Management
- Asset Discovery
- Asset Tracking
- Audit Management
- Audit Trail
- Authentication
- Automated Containment
- Automatic Patch Deployment
- Automatic Scans
- BYOD Management
- Backup and Recovery
- Behavioral Analytics
- Chat/Messaging
- Cloud Encryption
- Compliance Management
- Compliance Tracking
- Configuration Management
- Customizable Branding
- Customizable Fields
- Customizable Forms
- Customizable Reports
- Customization
- Dashboard
- Data Classification
- Data Import/Export
- Data Leak Prevention
- Data Security
- Data Visualization
- Deployment Management
- Device Management
- Diagnostic Tools
- Drag & Drop
- Email Attachment Protection
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- File Encryption
- File Sharing
- File Transfer
- HIPAA Compliant
- IT Asset Tracking
- IT Reporting
- Intellectual Property Protection
- Inventory Management
- Issue Auditing
- Issue Management
- Key Management
- License Management
- Maintenance Management
- Maintenance Scheduling
- Mobile Content Management
- Mobile Device Management
- Monitoring
- Multi-Channel Communication
- Multiple User Accounts
- Network Scanning
- Network Wide Management
- P2P Encryption
- PCI Compliance
- Password Management
- Password Protection
- Patch Management
- Patch Prioritisation
- Patch Testing
- Performance Metrics
- Phishing Protection
- Policy Management
- Prioritization
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Remote Access & Monitoring
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Remote Update/Installation
- Reporting & Statistics
- Reporting/Analytics
- Risk Analysis
- Risk Assessment
- Risk Management
- Runtime Container Security
- SQL Injections
- SSL Security
- Scheduling
- Screen Sharing
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Session Recording
- Session Transfer
- Single Sign On
- Source-Code Scanning
- Status Tracking
- Summary Reports
- Support Ticket Management
- Surveys & Feedback
- Task Management
- Third-Party Integrations
- Threat Protection
- Ticket Management
- Two-Factor Authentication
- Unattended Access
- Usage Tracking/Analytics
- User Management
- Virus Definition Update
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Workflow Management
Integrations
- Ansible Automation Platform
- Azure Active Directory
- Google Chrome
- Microsoft 365
- Microsoft Edge
- Microsoft Outlook
- Okta
- ServiceNow
- TeamViewer Remote
- Zendesk Suite
- Ansible Automation Platform
- Azure Active Directory
- Google Chrome
- Microsoft 365
- Microsoft Edge
- Microsoft Outlook
- Okta
- ServiceNow
- TeamViewer Remote
- Zendesk Suite