CylanceENDPOINT vs Cypherdog Encryption
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches,...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Chat
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Chat
Images
Pricing
Starting from
US$5.99/month
- Free Version
- Free Trial
- Subscription
Starting from
US$6.00/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.5/ 5Features
4.4/ 5Customer Service
4.4/ 5Value for Money
4.5/ 5Ease of Use
4.7/ 5Features
4.7/ 5Customer Service
4.6/ 5Value for Money
4.7/ 5Features
Total features 22
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anti Virus
- Application Security
- Authentication
- Backup and Recovery
- Cloud Encryption
- Compliance Management
- Configuration Management
- Data Classification
- Data Leak Prevention
- Data Security
- Device Management
- Email Attachment Protection
- Encryption
- Endpoint Management
- File Encryption
- File Transfer
- HIPAA Compliant
- Incident Management
- Intellectual Property Protection
- Intrusion Detection System
- Key Management
- Monitoring
- Network Security Software
- P2P Encryption
- Password Management
- Phishing Protection
- Policy Management
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Remote Monitoring & Management
- Secure Data Storage
- Server Monitoring
- Third-Party Integrations
- Threat Protection
- Threat Response
- User Management
- Virus Definition Update
- Vulnerability Scanning
- Web Threat Management
Total features 25
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anti Virus
- Application Security
- Authentication
- Backup and Recovery
- Cloud Encryption
- Compliance Management
- Configuration Management
- Data Classification
- Data Leak Prevention
- Data Security
- Device Management
- Email Attachment Protection
- Encryption
- Endpoint Management
- File Encryption
- File Transfer
- HIPAA Compliant
- Incident Management
- Intellectual Property Protection
- Intrusion Detection System
- Key Management
- Monitoring
- Network Security Software
- P2P Encryption
- Password Management
- Phishing Protection
- Policy Management
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Remote Monitoring & Management
- Secure Data Storage
- Server Monitoring
- Third-Party Integrations
- Threat Protection
- Threat Response
- User Management
- Virus Definition Update
- Vulnerability Scanning
- Web Threat Management
Integrations
Not provided by vendor
- Google Chrome
- Microsoft Edge
- Microsoft Outlook