ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 4 5 6 ... Next » (8 pages) Displayed: 1 - 25 of 193
Sort by:  relevance | title | downloads | rating | date
SilentNotes
SilentNotes 8.7.1   
... is its commitment to security. The app employs end-to-end encryption, meaning that only you can access your notes. ... privacy of their personal or professional information. The encryption is handled locally on your device, ensuring that ...
Open Source

HelpDesk
HelpDesk 11.19.9557.25020   
... features that cater to both support teams and end-users. One of the most compelling aspects of ... its comprehensive security features. The software includes SSL encryption, regular data backups, and role-based access control to ...
Trialware | $2 199.00

cwtch
cwtch 1.16.2   
Cwtch, developed by the Open Privacy Research Society, is a groundbreaking communication tool that redefines privacy and security in the digital age. As an expert in software reviews, I find Cwtch ...
Open Source

IPVanish screenshot
IPVanish 4.3.9.1   
... online anonymity. At its core, IPVanish offers end-to-end encryption, ensuring that all internet traffic is securely tunneled ...
Shareware

QOwnNotes
QOwnNotes 26.3.13 Build 1286   
... another area where QOwnNotes excels. The application offers end-to-end encryption, ensuring that your notes remain private and secure. ...
Demo

Notes
Notes 2.3.1   
... For those concerned about data security, "Notes" provides end-to-end encryption, ensuring that your notes are safe from unauthorized ...
Open Source

LINE
LINE 9.9.0 Build 3633   
... are paramount for LINE Corporation. The app employs end-to-end encryption for messages and calls, ensuring that user data ...
Freeware

Beeper
Beeper 4.2.630   
... are paramount in Beeper’s design. The platform employs end-to-end encryption to protect your messages from unauthorized access, ensuring ...
Open Source

GhostVolt
GhostVolt 1.3.3.0   
GhostVolt is an easy-to-manage, easy-to-use, smart encryption solution, built for collaboration and teamwork. GhostVolt encryption is fully automated at every event, ensuring data ... work-flow at every point on your network. Automated encryption not only saves time and cost but also ...
Demo | $40.00

GoWhisper screenshot
GoWhisper 1.0.19   
... global teams and multicultural interactions. 2. **End-to-End Encryption:** Security is paramount in today’s digital age, and GoWhisper takes this seriously. The software employs robust end-to-end encryption, ensuring that all communications remain private and ...
Shareware | $50.00

AnyCam
AnyCam 6.0.8.0   
... or business while away. The software employs robust encryption protocols to ensure that remote connections are secure, giving users peace of mind that their surveillance data is protected. AnyCam ...
Shareware | $34.00

Twingate
Twingate 2026.7.2078   
... is paramount in Twingate's design. The platform employs end-to-end encryption, multi-factor authentication, and continuous monitoring to safeguard data ...
Trialware | $5.00

TopNotify
TopNotify 3.1.1   
... with its robust security features. The software includes end-to-end encryption, ensuring that your notifications are secure and private. ...
Open Source

Free DRM Protection
Free DRM Protection 4.4.0.3214   
... open them. Authorization key can be binding with end user's hardware, one device one key, specify its ... DRM protected file. Encrypt media files with Advanced Encryption Standard (AES), which have a very high level ...
Freeware

Telegram Desktop
Telegram Desktop 6.6.2   
... connected without frustrating delays. Security is paramount, with end-to-end encryption safeguarding private conversations and a self-destruct timer for ...
Open Source

Express Dictate Digital Dictation
Express Dictate Digital Dictation 8.05   
... Express Dictate Digital Dictation Features: * Supports recording encryption if you are required to secure patient or ... wav, mp3 or dct formats (only dct supports encryption, sender information and notes) * Automatic non destructive ...
Shareware | $129.00

SymmetricDS Pro
SymmetricDS Pro 3.16.11   
... another area where SymmetricDS Pro excels. It provides end-to-end encryption for data in transit, ensuring that sensitive information ...
Demo

Joplin
Joplin 3.5.13   
... are paramount in Joplin's design. The application supports end-to-end encryption, ensuring that your data remains private and secure ...
Open Source

VMware InstallBuilder Professional
VMware InstallBuilder Professional 26.2.0 2026-02-17   
... user satisfaction and reducing the learning curve for end-users. Additionally, the installers support multiple languages, ensuring that ... robust security features, such as digital signatures and encryption, to protect the integrity of the installation packages ...
Demo | $1 995.00

Brave Browser
Brave Browser 1.88.132   
... can be sure that the browser uses connection encryption whenever it is available. Since it’s Chromium-based, you ... market is definitely a good one. At the end of the day, Brave is a very fast, ...
Open Source

Termius
Termius 9.37.4   
... Termius, and the software addresses this with robust end-to-end encryption. Users can rest assured that their data is ...
Shareware | $10.00

Express Dictate Professional
Express Dictate Professional 5.95   
... Express Dictate Digital Dictation Features: * Supports recording encryption if you are required to secure patient or ... wav, mp3 or dct formats (only dct supports encryption, sender information and notes) * Automatic non destructive ...
Shareware | $159.00

MP4Box
MP4Box 1.0.1   
... different sources and in different formats, for performing encryption of streams for attaching metadata to individual streams or to the whole ISO file to produce MPEG-21 compliant or hybrid MPEG-4/MPEG-21 ...
Freeware

Znote
Znote 3.6.9   
... Security is a top priority for Znote, with end-to-end encryption ensuring that your notes remain private and protected. ...
Open Source | $14.90

Session
Session 1.17.14   
... of the key features of Session is its end-to-end encryption, which ensures that messages can only be read by the intended recipients. This level of encryption is applied to all forms of communication within ...
Open Source
Results Page: 1 2 3 4 5 6 ... Next » (8 pages) Displayed: 1 - 25 of 193
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags