View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
March 10, 2017updated 26 Jul 2022 11:17am

Best encryption software: Top 5

These five options find a strong middle ground between price and reliability, with some of the free options offering extremely robust protection.

By Tom Ball

This list of five of the best encryption software on the market includes examples of platforms that enable a cutting edge, interactive experience by harnessing the storage capabilities of the cloud, and special decoy, deterrent features.

Also included in our list are systems that might be less high-tech and intuitive to use, but will equip a user with high-level, industry standard protection by incorporating multiple encryption methods. Some examples in this list are rooted in a specific operating system, while there are also systems included that provide maximum mobility.

Price is also factored into this list of the best options, with some of the free options presenting extremely effective safeguards from the free version of the system.


In contrast to systems such as Veracrypt, the only free element of this encryption software is the trial, however the product is widely considered robust, with capabilities to support small teams and individuals within a business setting.

AxCrypt was launched in 2001 with the intention of addressing the sharing of confidential data over the Internet, and to find security solutions for Internet services while aiming to make an easy to use design and appearance.

The specs behind the software include 128-bit or 256-bit advanced encryption standard (AES), and differs to some of the competition in that the software utilises cloud storage. This will mean the protection you receive with the product sill also span files saved on Dropbox or Google Drive.

A high level of interaction and control is made available with the software, as encrypted files can be accessed through a smartphone app. The software can also be used widely on a global scale, as advanced multilingual abilities are integrated within the software; some of these are Korean, Portuguese and Swedish.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester
Folder Lock uses decoy passwords – read more on the next page

Folder Lock

Folder Lock is another sturdy option, and the basic version of the software is also free. Although the design may not suit teams or businesses, the protection provided is suited to personal encryption.

With the current, concerning threat landscape taken into account, this software may still be of significant benefit to companies, as access can be gained to company assets via personal devices used inside and outside of the work environment by employees.

Mobile devices are the target of this software, with an app responsible for protecting files that range from contacts to recordings.

Unlike much of the competition, there is an additional feature that comes with Folder Lock that allows the user to set up hacker deterrents such as a decoy password, which can cause enough misdirection to repel an attack.

The software will also create a log of unauthorised login attempts, while additionally backing up password and alerting the user with notification if untoward activity is detected. The software also comes in a pro version.

An open source solution is next, claiming to be immune from ‘brute-force’ attacks


This encryption software is free to use in the basic form, and has been well reviewed as providing high levels of reliability and effectiveness. VeraCrypt is the successor of TrueCrypt, and a new alternative that is also an open source project.

VeraCrypt is designed to attach passwords to the user’s data after being provided with simple details about the data, such as location and the size of the body of data in question.

The software grants the user the ability to either encrypt single files, or entire folders or drives at a time. A central benefit of this product is that according to its creators it is immune to ‘brute-force’ attacks which could lead to sensitive data being decrypted.

In regard to ease of use, the product has been considered more suitable to a user with a good, pre-existing knowledge of encryption, as the interface has a sharp design, but does not issue pointers to those unfamiliar. However, extensive documentation is included to improve the learning process.

VeraCrypt was built on the original code used for TrueCrypt, but the transition intended to remove weak areas and negatives from its predecessor and create a more effective tool as a result.

Next up is encryption fully in the cloud


The interesting characteristic of CertainSafe is that it is fully cloud-based, standing in complete contrast to the system offered with CryptoExpert8.

CertainSafe is also compliant with industry regulation, and it attempts to repel and mitigate everything on the risk spectrum. The effectiveness of this fully cloud-based software is impressive for how new the technology is.

The platform will allow the user to share documents, photos, videos, private messages and other files. This system is conducive to collaboration, as the software enables the user to communicate with colleagues via the system, and at the same time it encrypts the conversation.

The nature of the current threat landscape also requires protection to be constantly monitoring movement and activity; this software provides automated security for business databases and applications. This process saves time that would be spent on manual tasks, a goal currently being targeted by all areas of cyber security.

The payment for this system is a monthly plan, with a demo available to aid the decision making process.

                                     READ MORE: Best Mac Antivirus: Top 5
Multiple encryption methods makes it even harder for hackers – according to CryptoExpert on the next page

CryptoExpert 8

This encryption software offer formidable protection, but could come at a cost of usability for some, as it has been regarded as complicated. This contrasts some of the other options that present simple user interfaces. The product is also only free for thirty days as a trial.

CryptoExpert8 contrasts many competitors as it uses multiple encryption methods, giving the user confidence that more hurdles stand in the way of the hacker. Another perhaps limiting factor is that Windows is the only platform that the software will function with.

The encryption software works by using data vaults for everything the user intends to secure, and it can secure vaults of unlimited size. In conjunction with this the software works by using Cast, 3DES and AES-256 encryption algorithms. 3DES and AES-256 can be considered industry-acclaimed

Another factor that might not appeal to a user seeking versatility and ease of use is the fact that the software is not integrated with cloud. The software will work with 32-bit and 64-bit versions of Windows 7, 8 and 10.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.