Background Information
Encryption | Developer | First released | Licensing | Maintained? |
---|---|---|---|---|
ArchiCrypt Live | Softwaredevelopment Remus ArchiCrypt | 1998 | Proprietary | Yes |
BestCrypt | Jetico | 1993 | Proprietary | Yes |
BitArmor DataControl | BitArmor Systems Inc. | 2008-05 | Proprietary | Yes |
BitLocker Drive Encryption | Microsoft | 2006 | Proprietary | Yes |
Bloombase Keyparc | Bloombase | 2007 | Proprietary | Yes |
CGD | Roland C. Dowdeswell | 2002-10-04 | BSD | Yes |
CenterTools DriveLock | CenterTools | 2008 | Proprietary | Yes |
Check Point Full Disk Encryption | Check Point Software Technologies Ltd | 1999 | Proprietary | Yes |
Conjurers Encrypter | Akash Shastri(Conjurers) | 2012-07 | Proprietary | Yes |
CrossCrypt | Steven Scherrer | 2004-02-10 | GPL | No |
Cryptainer | Cypherix (Secure-Soft India) | ? | Proprietary | Yes |
CryptArchiver | WinEncrypt | ? | Proprietary | Yes |
cryptoloop | ? | 2003-07-02 | GPL | No |
cryptoMill | SEAhawk | Proprietary | Yes | |
Discryptor | Cosect Ltd. | 2008 | Proprietary | Yes |
DiskCryptor | ntldr | 2007 | GPL | Yes |
DISK Protect | Becrypt Ltd | 2001 | Proprietary | Yes |
cryptsetup/dmsetup | Christophe Saout | 2004-03-11 | GPL | Yes |
dm-crypt/LUKS | Clemens Fruhwirth (LUKS) | 2005-02-05 | GPL | Yes |
DriveCrypt | SecurStar GmbH | 2001 | Proprietary | Yes |
DriveSentry GoAnywhere 2 | DriveSentry | 2008 | Proprietary | Yes |
E4M | Paul Le Roux | 1998-12-18 | Open source | No |
e-Capsule Private Safe | EISST Ltd. | 2005 | Proprietary | Yes |
eCryptfs | Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005 | GPL | Yes |
FileVault | Apple Inc. | 2003-10-24 | Proprietary | Yes |
FileVault 2 | Apple Inc. | 2011-7-20 | Proprietary | Yes |
FinallySecure Enterprise (SECUDE) | SECUDE | 2006 | Proprietary | Yes |
FREE CompuSec | CE-Infosys | 2002 | Proprietary | Yes |
FreeOTFE | Sarah Dean | 2004-10-10 | Open source | Yes |
GBDE | Poul-Henning Kamp | 2002-10-19 | BSD | Yes |
GELI | Pawel Jakub Dawidek | 2005-04-11 | BSD | Yes |
KryptOS | The MorphOS Development Team | 2010 | Proprietary | Yes |
loop-AES | Jari Ruusu | 2001-04-11 | GPL | Yes |
McAfee Endpoint Encryption (SafeBoot) | McAfee, Inc. | 2007 | Proprietary | Yes |
n-Crypt Pro | n-Trance Security Ltd | 2005 | Proprietary | Yes |
PGPDisk | PGP Corporation | 1998-09-01 | Proprietary | Yes |
Private Disk | Dekart | 1993 | Proprietary | Yes |
R-Crypto | R-Tools Technology Inc | 2008 | Proprietary | Yes |
SafeGuard Easy | Sophos (Utimaco) | 1993 | Proprietary | Yes |
SafeGuard Enterprise | Sophos (Utimaco) | 2007 | Proprietary | Yes |
SafeGuard PrivateDisk |
Sophos (Utimaco) | 2000 | Proprietary | Yes |
SafeHouse Professional | PC Dynamics, Inc. | 1992 | Proprietary | Yes |
Scramdisk | Shaun Hollingworth | 1997-07-01 | Open source | No |
Scramdisk 4 Linux | Hans-Ulrich Juettner | 2005-08-06 | GPL | Yes |
SecuBox | Aiko Solutions | 2007-02-19 | Proprietary | Yes |
SECUDE Secure Notebook | SECUDE | 2003 | Proprietary | Yes |
SecureDoc | WinMagic Inc. | 1997 | Proprietary | Yes |
Sentry 2020 | SoftWinter | 1998 | Proprietary | Yes |
softraid / RAID C | OpenBSD | 2007-11-01 | BSD | Yes |
SpyProof! | Information Security Corp. | 2002 | Proprietary | Yes |
svnd / vnconfig | OpenBSD | 2000-12-01 | BSD | Yes |
Symantec Endpoint Encryption | Symantec Corporation | 2008 | Proprietary | Yes |
TrueCrypt | TrueCrypt Foundation | 2004-02-02 | Free and open source (unique license however) TrueCrypt License 3.0 | Yes |
Aloaha Secure Stick | Aloaha | 2008 | Proprietary | Yes |
Name | Developer | First released | Licensing | Maintained? |
Read more about this topic: Comparison Of Disk Encryption Software
Famous quotes containing the words background and/or information:
“I had many problems in my conduct of the office being contrasted with President Kennedys conduct in the office, with my manner of dealing with things and his manner, with my accent and his accent, with my background and his background. He was a great public hero, and anything I did that someone didnt approve of, they would always feel that President Kennedy wouldnt have done that.”
—Lyndon Baines Johnson (19081973)
“When action grows unprofitable, gather information; when information grows unprofitable, sleep.”
—Ursula K. Le Guin (b. 1929)