Security and privacy applications

  • Libre
  • |
  • 69 alternatives

Metiix Blockade is a comprehensive security and privacy application designed to protect users from malicious threats. It helps use...

  • Libre
  • |
  • 5 alternatives

Track My Mac is a security and privacy application designed to help users protect and monitor their Mac computers. It allows users...

  • Freemium
  • |
  • 27 alternatives

Quatrix is a secure, cloud-based file sharing and storage application designed to make sharing, collaboration and data management ...

  • Libre
  • |
  • 25 alternatives

Batch File Split & Join is an application or web-based tool that allows users to divide a large file into several smaller files or...

  • Freemium
  • |
  • 12 alternatives

Batch File Encryptor is an application or website that allows users to securely encrypt multiple files simultaneously. This applic...

  • Libre
  • |
  • 33 alternatives

Yandex.Key is a mobile application and website developed by Yandex, a Russian internet company, that allows users to securely auth...

  • Freemium
  • |
  • 44 alternatives

USL OST Extractor Pro is an advanced application for recovery and conversion of Microsoft Outlook OST (Offline Storage Table) file...

  • Libre
  • |
  • 84 alternatives

Restoration is an application (or website) designed to undo changes made to a system, such as a computer, by restoring it to an ea...

  • Libre
  • |
  • 3 alternatives

Virus Bulletin is an online magazine and resource center designed to provide users with the latest information on computer securit...

  • Freemium
  • |
  • 13 alternatives

PatrolServer is an advanced security and privacy application that provides users with the ability to monitor and control access to...

  • Libre
  • |
  • 13 alternatives

CYGO Network is a secure, privacy-focused mobile application that allows users to securely manage their digital identity and priva...

  • Libre
  • |
  • 6 alternatives

PGP Global Directory is an open-source, secure directory service for users to store and manage their public key information. It is...