Cypherdog Encryption vs WatchGuard Endpoint Security
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to the communication.
No "trusted" third party, zero-knowledge security model, asymmetric encryption.
Cypherdog Encryption (CE) provides the ability to encrypt and decrypt e-mails with attachments with confirmation of the identity of the parties to...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems against cyber threats and detect endpoint malware through a unified platform
Designed for businesses of all sizes, WatchGuard Endpoint Security is a cloud-based computer security software that helps businesses protect systems...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$6.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.7/ 5Features
4.7/ 5Customer Service
4.6/ 5Value for Money
4.7/ 5Ease of Use
4.4/ 5Features
4.3/ 5Customer Service
4.1/ 5Value for Money
4.0/ 5Features
Total features 25
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Virus
- Application Security
- Audit Trail
- Authentication
- Backup and Recovery
- Behavioral Analytics
- Cloud Encryption
- Compliance Management
- Configuration Management
- Continuous Monitoring
- Customizable Reports
- Data Classification
- Data Leak Prevention
- Data Security
- Data Visualization
- Device Management
- Email Attachment Protection
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- File Encryption
- File Transfer
- Firewalls
- HIPAA Compliant
- Incident Management
- Intellectual Property Protection
- Key Management
- Monitoring
- P2P Encryption
- Patch Management
- Phishing Protection
- Policy Management
- Prioritization
- Ransomware Protection
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting/Analytics
- Risk Analysis
- Root Cause Analysis
- Secure Data Storage
- Secure Login
- Security Auditing
- Summary Reports
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- User Management
- Vulnerability Scanning
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
Total features 42
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Virus
- Application Security
- Audit Trail
- Authentication
- Backup and Recovery
- Behavioral Analytics
- Cloud Encryption
- Compliance Management
- Configuration Management
- Continuous Monitoring
- Customizable Reports
- Data Classification
- Data Leak Prevention
- Data Security
- Data Visualization
- Device Management
- Email Attachment Protection
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- File Encryption
- File Transfer
- Firewalls
- HIPAA Compliant
- Incident Management
- Intellectual Property Protection
- Key Management
- Monitoring
- P2P Encryption
- Patch Management
- Phishing Protection
- Policy Management
- Prioritization
- Ransomware Protection
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Remediation Management
- Reporting/Analytics
- Risk Analysis
- Root Cause Analysis
- Secure Data Storage
- Secure Login
- Security Auditing
- Summary Reports
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- User Management
- Vulnerability Scanning
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
Integrations
- Google Chrome
- Microsoft Edge
- Microsoft Outlook
Not provided by vendor