BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches,...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Chat
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication. No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Chat

Starting from

US$5.99/month

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$6.00/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.6 /5
(66)

Ease of Use

4.5/ 5

Features

4.4/ 5

Customer Service

4.4/ 5

Value for Money

4.5/ 5

Overall rating

4.8 /5
(103)

Ease of Use

4.7/ 5

Features

4.7/ 5

Customer Service

4.6/ 5

Value for Money

4.7/ 5

Total features 22

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Configuration Management
  • Data Classification
  • Data Leak Prevention
  • Data Security
  • Device Management
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • File Encryption
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Intellectual Property Protection
  • Intrusion Detection System
  • Key Management
  • Monitoring
  • Network Security Software
  • P2P Encryption
  • Password Management
  • Phishing Protection
  • Policy Management
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Remote Monitoring & Management
  • Secure Data Storage
  • Server Monitoring
  • Third-Party Integrations
  • Threat Protection
  • Threat Response
  • User Management
  • Virus Definition Update
  • Vulnerability Scanning
  • Web Threat Management

Total features 25

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Authentication
  • Backup and Recovery
  • Cloud Encryption
  • Compliance Management
  • Configuration Management
  • Data Classification
  • Data Leak Prevention
  • Data Security
  • Device Management
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • File Encryption
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Intellectual Property Protection
  • Intrusion Detection System
  • Key Management
  • Monitoring
  • Network Security Software
  • P2P Encryption
  • Password Management
  • Phishing Protection
  • Policy Management
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Remote Monitoring & Management
  • Secure Data Storage
  • Server Monitoring
  • Third-Party Integrations
  • Threat Protection
  • Threat Response
  • User Management
  • Virus Definition Update
  • Vulnerability Scanning
  • Web Threat Management
Not provided by vendor
  • Google Chrome
  • Microsoft Edge
  • Microsoft Outlook