It does the job, though its secure deletion tool can’t scrub away traces of the unencrypted originals. Specially tailored to meet the growing security and privacy needs of the corporate user, Cryptainer SE combines the ease of use and simple drag-and-drop operations with strong encryption, to ensure total security, with a zero learning curve and maximum convenience. You have the freedom to implement your company security policies without changing any underlying software. No more password protecting files one at a time. What you get is foolproof, hassle-free, unbreakable security. You can also use Cryptainer to decrypt files you’ve received via email.

cryptainer se

Uploader: Vudozshura
Date Added: 1 July 2015
File Size: 50.83 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 91009
Price: Free* [*Free Regsitration Required]

You could laboriously sf out an encrypted version by hand, using one cipher or another, and then burn the original. Encrypting data at the user level is the easiest and most foolproof method of data security.

Cryptainer SE – Free download and software reviews – CNET

You have cryptakner possibility to load and unload each encrypted container whenever you need. Group a series of encryption and decryption commands in a single or multiple batch files. The same is true of Cypherix SecureITwhich is a more traditional file- and folder-encryption utility from the same company.

What you get is foolproof, hassle-free, unbreakable security.

cryptainer se

It both warns about bad password habits such as including dictionary words and offers advice for improvement such as adding numbers. The New Streaming Giants Explained. Nice try, but that’s not what users need. With well over 7 million users, it proves crypfainer be appropriate for all network security needs.


Cypherix Cryptainer PE

The recipient need not have a copy of Cryptainer PE installed to decrypt the files. This makes it ze appropriate and necessary tool in network security. Bruce Schneier’s Blowfish algorithm uses a longer key than AES, so in theory it’d be even harder to crack. For full security you must delete the unsecured original.

cryptainer se

PCMag reviews products independentlybut we may earn affiliate commissions from buying cryptxiner on this page. Cypherix Cryptainer PE aims to keep your files safe inside its encrypted volumes. The Cryptainer Administrative Module provides corporate users with single point control and monitoring of the distributed security system without introducing any of the weaknesses inherent in the underlying operating systems.

Like Folder Lock, Steganos Safe includes a comprehensive secure deletion component. New in this edition, Cryptainer displays a strength rating as you type your password.

You can cryptaijer its encrypted containers using two-factor authentication, hide the very existence of a container, or create a container that occupies an entire disk partition. However, where SecureIT displays the entire file system of the computer, Cryptainer just displays what’s on the encrypted volume. Each encrypted drive can be loaded and unloaded cryptainsr needed. These three are our current Editors’ Choice products for consumer-accessible encryption.


You can create as many additional volumes as you want.

cryptainer se

Of course, you pay for these suites every year, while Cryptainer is a one-time purchase. AxCrypt Premium is amazingly easy to use, and has a very modern appearance. Cryptainer SE ensures your privacy by keeping your data private and secure on your PC as well as removable storage.

It’s powerful bit encryption, creates multiple MB 32 GB encrypted containers drives on your hard disk.

In this system, if I want to send you a file, I look up your public key and encrypt the file with it. More From Neil J. You can also open a volume as read-only, or open it so it’s only visible to the current Windows user account. Note that this encrypted volume technology appears as a feature in some high-end security suites, and it’s typically easier to use than Cryptainer. Loading a secondary volume is far from difficult, as long as you remember where to find the file.

Secure deletion doesn’t handle unencrypted originals. Cons Secure deletion doesn’t handle unencrypted originals.