Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication. No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$16.00/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$6.00/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.6 /5
(70)

Ease of Use

4.1/ 5

Features

4.6/ 5

Customer Service

3.9/ 5

Value for Money

4.5/ 5

Overall rating

4.8 /5
(103)

Ease of Use

4.7/ 5

Features

4.7/ 5

Customer Service

4.6/ 5

Value for Money

4.7/ 5

Total features 57

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Management
  • Application Security
  • Audit Management
  • Augmented Analytics
  • Authentication
  • Auto Extraction
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Configuration Management
  • Content Management
  • Customizable Dashboard
  • Customizable Reports
  • Dashboard
  • Data Aggregation
  • Data Aggregation and Publishing
  • Data Analysis Tools
  • Data Classification
  • Data Cleansing
  • Data Connectors
  • Data Discovery
  • Data Import/Export
  • Data Leak Prevention
  • Data Management
  • Data Security
  • Data Storage Management
  • Data Visualization
  • Diagnostic Tools
  • Document Storage
  • Email Attachment Protection
  • Encryption
  • Event Logs
  • File Encryption
  • File Management
  • File Transfer
  • For Websites
  • Forecasting
  • Full Text Search
  • HIPAA Compliant
  • High Volume Processing
  • Incident Management
  • Indexing
  • Intellectual Property Protection
  • KPI Monitoring
  • Key Management
  • Log Analysis Software
  • Log Collection
  • Machine Learning
  • Natural Language Processing
  • Natural Language Search
  • No-Code
  • P2P Encryption
  • Performance Metrics
  • Phishing Protection
  • Policy Management
  • Predictive Analytics
  • Ransomware Protection
  • Real-Time Monitoring
  • Relational Display
  • Reporting/Analytics
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Single Page View
  • Single Sign On
  • Templates
  • Third-Party Integrations
  • Threat Protection
  • Two-Factor Authentication
  • User Management

Total features 25

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Management
  • Application Security
  • Audit Management
  • Augmented Analytics
  • Authentication
  • Auto Extraction
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Configuration Management
  • Content Management
  • Customizable Dashboard
  • Customizable Reports
  • Dashboard
  • Data Aggregation
  • Data Aggregation and Publishing
  • Data Analysis Tools
  • Data Classification
  • Data Cleansing
  • Data Connectors
  • Data Discovery
  • Data Import/Export
  • Data Leak Prevention
  • Data Management
  • Data Security
  • Data Storage Management
  • Data Visualization
  • Diagnostic Tools
  • Document Storage
  • Email Attachment Protection
  • Encryption
  • Event Logs
  • File Encryption
  • File Management
  • File Transfer
  • For Websites
  • Forecasting
  • Full Text Search
  • HIPAA Compliant
  • High Volume Processing
  • Incident Management
  • Indexing
  • Intellectual Property Protection
  • KPI Monitoring
  • Key Management
  • Log Analysis Software
  • Log Collection
  • Machine Learning
  • Natural Language Processing
  • Natural Language Search
  • No-Code
  • P2P Encryption
  • Performance Metrics
  • Phishing Protection
  • Policy Management
  • Predictive Analytics
  • Ransomware Protection
  • Real-Time Monitoring
  • Relational Display
  • Reporting/Analytics
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Single Page View
  • Single Sign On
  • Templates
  • Third-Party Integrations
  • Threat Protection
  • Two-Factor Authentication
  • User Management
  • Google Chrome
  • Microsoft Edge
  • Microsoft Outlook
  • PagerDuty
  • Slack
  • Google Chrome
  • Microsoft Edge
  • Microsoft Outlook
  • PagerDuty
  • Slack