Skip to main content
TrustRadius
Invisible Secrets

Invisible Secrets

Overview

What is Invisible Secrets?

Invisible Secrets is a file encryption and steganography software offered by east-tec. According to the vendor, this software is designed to provide maximum security for confidential information. It is suitable for businesses of all sizes, ranging from small enterprises to large corporations. The software...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Endpoint Security Software

Be the first one in your network to review Invisible Secrets, and make your voice heard!

Return to navigation

Pricing

View all pricing

Basic

$39.95

Cloud
one-time fee

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is Invisible Secrets?

Invisible Secrets is a file encryption and steganography software offered by east-tec. According to the vendor, this software is designed to provide maximum security for confidential information. It is suitable for businesses of all sizes, ranging from small enterprises to large corporations. The software caters to various professions and industries, including IT professionals, security professionals, legal professionals, financial institutions, and government organizations.

Key Features

File Encryption Software: According to the vendor, the software allows users to encrypt file and folder structures on their computer using strong encryption algorithms to protect confidential information from unauthorized access.

Hide Files: The software enables users to hide files and sensitive data within innocent carrier files such as JPEG, PNG, BMP, HTML, and WAV. According to the vendor, this feature helps distract attention and prevent data breaches.

Securely Password Protect Any Application: According to the vendor, the software offers a powerful lock program feature that securely password protects any application on the computer, allowing access only on a password basis and providing an additional layer of security.

Password Manager and Generator: The software securely stores and manages login data using a password manager approach, according to the vendor. It also generates highly secure passwords with a click of a mouse, ensuring password uniqueness.

Email Encryption Software: According to the vendor, the software allows users to create executable packages with encrypted content to be sent by email. These packages can be locally stored or transferred via a USB device. Recipients do not need to have the software installed to decrypt the package; only the correct password is required.

Self Decrypting Packages: The software creates encrypted self-decrypting packages that can be sent as zip files by email, according to the vendor. This feature provides an alternative to sending executable attachments that may be rejected by email servers. Recipients can decrypt the package on their computer with the correct password.

Cryptography Software: According to the vendor, the software utilizes strong encryption algorithms such as AES-Rijndael, Blowfish, Twofish, RC4, Cast128, GOST, Diamond 2, and Sapphire 2. This ensures secure data transmissions and protection against unauthorized access, helping businesses comply with privacy protection laws and regulations.

File Shredder: The software selectively and permanently erases confidential files and folders, according to the vendor. This feature ensures that deleted files cannot be recovered by any data recovery software, providing an additional layer of security for sensitive data.

Protection Against KeyLoggers: According to the vendor, the software includes a virtual keyboard to prevent keylogger software from stealing passwords. This feature ensures secure entry of passwords and other sensitive information, protecting against unauthorized access to confidential data.

Cryptboard: The software allows users to add files to the Cryptboard for later encryption, according to the vendor. This feature provides a convenient way to manage files and perform encryption operations, streamlining the encryption process and enhancing user experience.

Invisible Secrets Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation