Top 15 Zed! Alternative and Similar Softwares | Apr 2024

Zed! protects your personal and sensitive data in encrypted archives on e-mail, on USB sticks and in backups.

ENCRYPTION

With its encryption technology derived from various certified professional solutions, Zed! guarantees optimal levels of data protection and confidentiality for exchange and storage. The data encrypted by Zed! can only be decrypted by users with a valid access key.

Using Zed! is highly intuitive.
Create a .zed container in a single click to which you can add folders, files and grant users. The container is then ready to be sent, with the inside files encrypted. Zed! is able to transport an entire file tree structure with no volume constraints.

1. Windows BitLocker

Windows BitLocker Windows BitLocker & "Bitlocker To Go" Drive Encryption is a data protection feature in Windows Vista Enterprise and Windows Vista Ultimate for client computers and in Windows Server 2008. BitLocker protects against data theft or exposure on computers that are lost or stolen, and offers more secure data deletion when......

2. OnionMail

OnionMail OnionMail is an anonymous and encrypted mail server designed to run on the TOR network without losing the ability to communicate with the Internet. This ensures greater privacy to the users but also protect against eavesdropping of the NSA and others.......

3. APG

APG Android Privacy Guard (APG) is a free and open source application for Android devices, created by Thialfihar, that lets you encrypt and decrypt single files or emails. Its goal is to provide a similar OpenPGP implementation as GnuPG .......

4. east-tec InvisibleSecrets

east-tec InvisibleSecrets east-tec InvisibleSecrets not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for......

5. iSteg

iSteg iSteg is an encryption tool used to hide a file (for example a zip archive) inside a jpeg picture. This encryption technology is called steganography. iSteg is a frontend for the opensource tool outguess 2.0. iSteg can be used to both encode and decode a hidden file.......

6. CryptUP: Encrypt Gmail with PGP

CryptUP: Encrypt Gmail with PGP CryptUP lets you Encrypt Gmail with PGP in 60 seconds. Easiest end-to-end encryption for Google Email.CryptUP supports attachments, drafts, conversations.. just like Gmail you are used to.......

7. Safeplicity

Safeplicity Do you have sensitive files you would like to password-protect but don’t know how? With Safeplicity, you can password-protect AND encrypt all your confidential files in just a few clicks, without any IT skills whatsoever. To protect a folder, you simply right-click on it, choose “Protect with Password” and choose......

8. CAcert

CAcert CAcert.org is a community-driven Certificate Authority that issues certificates to the public at large for free.CAcert's goal is to promote awareness and education on computer security through the use of encryption, specifically by providing cryptographic certificates. These certificates can be used to digitally sign and encrypt email, authenticate and authorize......

9. Jetico BestCrypt

Jetico BestCrypt If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCrypt software automatically encrypts your files so that nobody can read the data unless they have the right password or keys.BestCrypt supports several encryption algorithms and security standards and offers multiple......

10. Encipher.It

Encipher.It Encrypting email with Encipher.it is a simple way to protect your sensitive data. You can encrypt emails or text messages and only the recipient can decrypt it with correct password. Encipher.it integrated with google mail and many other web applications.......

11. GPGMail

GPGMail GPGMail is an open source plugin for Apple Mail. It brings the functionality to sign, verify, encrypt and decrypt mails using the OpenPGP standard.......

12. B.VPN

B.VPN You can easily setup b.VPN on Windows, Mac, iOS and Android. b.VPN is simple and user-friendly with a very-easy-to configure interface. You only need to create an account, install the application on any device you want and log in to enjoy the benefits of an immediate, advanced, unrestricted and highly......

13. Privacy Optimizer

Privacy Optimizer This powerful tool suite will allow you to change your System default privacy settings, and allows you to easily and quickly hide your IP via the integrated proxy manager. Privacy Optimizer also includes a free privacy optimized web browser that more readily fulfills the need to be anonymous in both......

14. Steganos Safe

Steganos Safe Safely encrypt sensitive dataOn PCs, in networks and in the CloudConfidential documents, business records and TAN lists all belong in a safe place. Steganos Safe 18 is a digital vault that protects everything you don’t want anyone else to see.The clearly structured new user interface ensures that this highly professional......

15. TrueCrypt

TrueCrypt [TrueCrypt is not exactly "Open Source", but the source is available. See the reviews to get......