Security and privacy applications

  • Libre
  • |
  • 9 alternatives

Sophos UTM is an enterprise-grade security solution designed to protect businesses from malicious cyber threats. It combines advan...

  • Libre
  • |
  • 472 alternatives

Joplin is an open source file management application and software for Windows, Mac, and Linux platforms. It is designed to keep tr...

  • Libre
  • |
  • 167 alternatives

CyberGhost VPN is a security and privacy application that allows users to securely access the internet. It provides a secure conne...

  • Libre
  • |
  • 71 alternatives

AES Crypt is a cross-platform, open-source file encryption software that uses the Advanced Encryption Standard (AES) encryption al...

  • Freemium
  • |
  • 101 alternatives

GoodSync is a backup and sync application that helps users securely backup, synchronize, and restore files between multiple device...

  • Libre
  • |
  • 8 alternatives

OPNsense is a powerful open-source firewall and routing platform based on FreeBSD. It is designed to provide advanced security, ro...

  • Freemium
  • |
  • 13 alternatives

DeHashed is a security and privacy application that enables users to protect their online identity and data. It allows users to ea...

  • Libre
  • |
  • 22 alternatives

ActivityWatch is a tool that helps users monitor the time they spend on their computer. It tracks the usage of applications, websi...

  • Freemium
  • |
  • 97 alternatives

R-Studio is a powerful data recovery and backup software application designed to quickly and easily recover data from damaged or l...

  • Libre
  • |
  • 147 alternatives

1Password is a powerful password manager and secure digital vault that helps you to keep your online accounts safe and secure. Wit...

  • Libre
  • |
  • 4 alternatives

Disroot is an open-source platform that provides free and secure online services, such as email, online storage, and web hosting. ...

  • Libre
  • |
  • 6 alternatives

Aircrack-ng is an open source security-focused network auditing tool for 802.11 a/b/g/n networks. It can be used to assess the sec...