parallax background

How it works

One-click. Complete protection. Cypherdog Encryption allows you to encrypt and decrypt any text or file and send them using any media, including e-mails supported by plugins to Firefox, Chrome and Edge browsers, Gmail/Google Suite, AddIns in Outlook and Thunderbird.

You can send and receive encrypted files and messages using any web client or native e-mail client or Slack, WeTransfer, Google Drive, or any other communication method. You are always assured that only the authorized recipient will have access to the decrypted content.

The software allows for bulk encryption and decryption of files or texts via command-line interface, enabling its use by organizations sending multiple encrypted documents to their counterparts, such as banks or medical diagnostic stations.

Threats in cyberspace

E-mail is one of the most popular electronic communication channels. Like most digital services, it is vulnerable to cyberattacks, which may result in unwanted access to your mailbox and disclosure of confidential information. In the event of unauthorized use of the compromised mailbox, message recipients cannot confirm the sender's identity. 
 


Activities such as file transfer, file sharing, or messaging are susceptible to cyberattacks, often resulting in the leakage or theft of data for the purpose of economic espionage or compromising the organization. Invoice hacking and ransomware are the most rampant and dangerous cyber threats existing today. Cypherdog Encryption provides a solution to combat them.

Security

Cypherdog Encryption is based on a combination of asymmetric (RSA3072) and symmetric (AES-256) encryption. There is no “trusted” third party in our solution, including us, no Certification Authority and no other communication channel provider (e.g. e-mail service provider). We do not have access to data encrypted by users because we do not have access or copies of the private keys needed for decryption. 


Cypherdog Encryption is a comprehensive solution: on the one hand, it provides encryption of messages and keeping their contents undisclosed to unlawful users; on the other hand, it allows the recipient to confirm the sender's identity.

Cypherdog Encryption supports GDPR, DORA, NIS2, and ISO 2700x implementations and other regulations.

Friendly user interface

Cypherdog Encryption software focuses on simplicity and ease of use. Its Installation process and user registration system are so simple that any individual who has experience with installing antivirus software should be able to handle it without difficulty.

You can encrypt a file by right-clicking and selecting the recipient. You can decrypt a file simply by double-clicking on the file icon. E-mail messages can be partially or fully encrypted by right-clicking on the selected text. Decryption is straightforward and requires only clicking on a button or link, without sharing any passwords or codes with other parties. Cypherdog Encryption, once installed, is all that is needed.

 

Cypherdog Encryption specificationsFree mobileFree desktop
(after trial)
Single User & TrialBusiness
Text/e-mail messages encryption-
Encryption of files/attachments in e-mail messages-
Decryption of e-mail messages/ texts and attachments/ files
Administration panel for users & private keys management---
Backup private key to file (on device)-
Backup of private key to company server in Vault---
One license key for a single user---
One license key for multiple users---
Basic support and online training-
Advanced support and training---
Command line text/file encryption/decryption-- (scalable)
Cooperation with security systems on gateway---
E-mail aliases-
CryptographyEncryption: asymmetric RSA3072 and symmetric AES-256, SHA512 hash function
Microsoft OutlooksupportedAdd-ins to Outlook 2016+ for Microsoft 365/ Exchange Server, webclient & native
GmailsupportedPlugins: Google Chrome, Microsoft Edge, Mozilla Firefox
Mozilla ThunderbirdsupportedAdd-ons for Thunderbird for all e-mail providers and servers
Other e-mail clientsall supportedManual encryption / decryption / right-click or “magic window”
Other communication channelsall supportedWeTransfer, Slack, Google Drive, Dropbox, WhatsApp, Messenger etc.
Operating systemsiOS/AndroidWindows, macOS, Linux + free mobile app (iOS, Android)

 

Pricing


Free mobile

free

$ 0 / user / year

All features available

Download Google Play
Download App Store

Free desktop

free

$ 0 / user / year

Single User features in the first 14 days, after this period only decryption function

Download

Single User

for SOHO & SME

$ 60 / year

After 14 days without a license code, it goes to the Free version

Try for freeBuy now

Business

starting from 25 users

$ 80 / user / year

Try for freeBuy nowBook consultation

Free mobile

free

$ 0 / user / month

All features available

Download Google Play
Download App Store

Free desktop

free

$ 0 / user / month

Single User features in the first 14 days, after this period only decryption function

Download

Single User

for SOHO & SME

$ 6 / month

After 14 days without a license code, it goes to the Free version

Try for freeBuy now

Business

starting from 25 users

$ 8 / user / month

Try for freeBuy nowBook consultation

Advantages


 


parallax background
parallax background

Token


Everything in our ecosystem will be transacted in $CDOG


Learn more about Token

parallax background

Token


Everything in our ecosystem will be transacted in $CDOG


Learn more about Token

Testimonials


 




Capterra Shortlist for Encryption Jan-2023

parallax background

Blog


 


27 October 2023

Strong Encryption as a Business Imperative: Ensuring Data Security and Customer Trust

  In today’s business landscape, data is often considered the new oil. Companies of all sizes and across industries are collecting, storing, and processing vast amounts […]
20 October 2023

Does Your App Use Real Encryption? The Critical Role of Data Security in Today’s Digital Landscape

In an era where data breaches and cyber threats loom large, ensuring that your applications use real encryption is not just a best practice; it’s a […]
13 October 2023

How Cypherdog End-to-End Encryption Can Save You Millions

  In today’s digital landscape, securing sensitive data has never been more critical. The potential financial losses associated with data breaches and cyberattacks are staggering, and […]
1FAQ

1. What is the best about your file encryption software?

Our encryption software, Cypherdog Encryption, is based on asymmetric encryption without any “trusted” third party being involved and designed in a zero knowledge security model. This means that no one else has access to the decrypted data - only the sender and the recipient can see it.

2. Do you offer the best encryption algorithm in your encryption software?

In our encryption software, Cypherdog Encryption, we are using advanced encryption, such as asymmetric and symmetric algorithms, RSA3072 and AES-256.

3. How to encrypt email with your encryption app?

With our encryption app, Cypherdog Encryption, you can encrypt e-mail content in Outlook and Gmail with a single click, so you know how to encrypt Outlook and how to encrypt Gmail. For other e-mail clients, you should employ our “magic window” to encrypt data. To encrypt attachments, you can use our app from the sidebar or simply right click on the file.

4. Can I encrypt a file for free?

To encrypt sensitive files for free, you can use the Cypherdog Encryption Single User trial version, which will have all features, including file encryption, for 14 days. This way you can protect your personal files for free.

5. Do I need to worry about hackers decrypting my files?

With our top encryption software, you don’t need to worry about hackers decrypting your files and hackers decrypting your passwords. Hackers don’t have access to your private key. Your encryption key is securely stowed away on your device in encrypted form, protected by your password that you created. This encryption key is not transferred between users.

6. Are your security tools designed specifically for individuals and small businesses?

Cypherdog Encryption Single User is one of our popular security tools tailored for small companies or individuals, particularly those in the professional sector. This version comes with a single user license and installation is as straightforward as any antivirus software.

7. Why do I need to use encryption? Is data encryption necessary?

Encryption is a method of protecting sensitive data. Encryption software will automatically protect files and your sensitive data, and can enhance the security of communication between client apps and servers. In essence, when your data is encrypted, even if an unauthorized person or entity gains access to it, they will not be able to read it. So why do you need to use encryption? Is it necessary? It's necessary if you need to securely transmit your sensitive data. Cypherdog Encryption is more affordable than a cup of coffee and ensures comprehensive protection for all your data. Our software encryption grants you access to methods on how to encrypt Google Suite, how to encrypt Outlook, how to encrypt files on Google Drive, how to encrypt files on Dropbox, how to encrypt Wetransfer, and how to encrypt Slack.

8. What is RSA encryption?

Among many encryption solutions, RSA encryption (Rivest–Shamir–Adleman) stands out as an effective encryption program employed to guarantee secure data transmission. It provides a robust security level with a 2048-bit key length. The RSA encryption algorithm consists of three parts: key generation, encryption, and decryption. At the outset, two keys are generated - public and private. The public key is used to encrypt files, while the private key serves to decrypt them.

9. Do I use a private and public key in your security software?

Yes, our security software uses both a public and private key. Cypherdog Encryption is the best encryption software based on asymmetric encryption - a type of encryption that utilizes two distinct yet mathematically related keys to encrypt data and decrypt data. The public key encrypts data, while its corresponding private key decrypts it.

10. Do your encryption software solutions affect performance?

We are utilizing a dual algorithm approach with our encryption software solutions: symmetric and asymmetric. Asymmetric provides the highest level of security, while symmetric offers the speed. To put it another way, the timing of the encryption process is equivalent to that of WinZip.

11. Why are your encryption methods necessary to protect files saved on services?

Many of the services do not offer complete protection, since there is always a possibility of someone accessing our data by cracking the security. To avoid having your files stolen, it is recommended to utilize encryption techniques, such as Google Suite encryption, Google Drive encryption, Dropbox encryption, and Wetransfer encryption.

12. Do you offer the best encryption software for 2023 to protect my sensitive data?

Cypherdog Encryption is an exceptionally useful encryption tool because it is based on asymmetric encryption, the zero-knowledge security model, and eliminates the need for any third party interference, such as e-mail providers, us and any Certification Authority.

13. Do you support Outlook encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with Outlook used in conjunction with Microsoft Exchange or Microsoft 365. We have developed AddIns for both native and webclient platforms.

14. Do you support Gmail encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with Gmail through plugins for the most popular browsers: Microsoft Edge, Mozilla Firefox and Google Chrome.

15. Do you support Slack encryption?

Yes, our encryption software, Cypherdog Encryption, is compatible with ANY communication medium. To encrypt any text, you can use our “magic window” feature - which is included in tour encryption software.