---
description: Review of EncryptRIGHT Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice New Zealand.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: EncryptRIGHT | Reviews, Pricing & Demos - SoftwareAdvice NZ
---

Breadcrumb: [Home](/) > [Data Privacy Software](/directory/4523/data-privacy/software) > [EncryptRIGHT](/software/346042/encryptright)

# EncryptRIGHT

Canonical: https://www.softwareadvice.co.nz/software/346042/encryptright

> EncryptRIGHT simplifies application level data protection by abstracting data protection policies from application programming, while providing a complete separation of duties between information security and application programming.  Leveraging a Data Security Governance approach, EncryptRIGHT defines and enforces how data is protected, who may access specific data, and what format that data will take when access is granted (unrestricted, partially masked or fully restricted).&#10;&#10;A unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy. EncryptRIGHT protects the data at the application layer with the encryption or tokenization techniques, formats and methodologies defined in the data protection policy. Role-based access controls are applied to unsecure data in the exact format authorized for specific applications or users – fully restricted, unrestricted or partially concealed with the appropriate data mask dynamically applied. Managing cryptographic keys in and across applications can be very complicated, but EncryptRIGHT centralizes and automates cryptographic key management.&#10;&#10;Data protection policies are automatically and uniformly enforced, and built-in audit and reporting functionality provides traceability and alerting to assure that data is secured, privacy is protected, and compliance is met. Support for a variety of interfaces, from COBOL to C\# and Java, from CLI to Web API, allows programmers to connect using the interfaces with which they are most comfortable, and out-of-the-box functionality for every common enterprise operating system, from IBM mainframe to Windows, means less customization and quicker implementations wherever enterprise applications run, on premise or in the cloud. With EncryptRIGHT, protecting data where it is most exposed and susceptible to risk has never been so easy.
> 
> Verdict: Rated \*\*\*\* by 0 users. Top-rated for **Overall Quality**.

-----

## About the vendor

- **Company**: Prime Factors
- **Founded**: 1981

## Commercial Context

- **Starting Price**: US$29,900.00
- **Pricing model**: Per Feature (Free Trial)
- **Pricing Details**: Pricing depends on the scope of the system design.
- **Target Audience**: 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based, Windows (Desktop), Linux (Desktop), Windows (On-Premise), Linux (On-Premise)
- **Supported Languages**: English
- **Available Countries**: Afghanistan, Albania, Algeria, American Samoa, Andorra, Angola, Anguilla, Antigua & Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan, Bahamas, Bahrain, Bangladesh, Barbados, Belarus, Belgium and 205 more

## Features

- API
- Access Controls/Permissions
- Active Directory Integration
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Application Encryption
- Audit Management
- Audit Trail
- Authentication
- Cloud Encryption
- Cloud Security Policy Management
- Compliance Management
- Credential Management
- Customisable Reports
- Data Governance
- Data Masking
- Data Security
- Encryption
- Event Logs

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support

## Category

- [Data Privacy Software](https://www.softwareadvice.co.nz/directory/4523/data-privacy/software)

## Related Categories

- [Data Privacy Software](https://www.softwareadvice.co.nz/directory/4523/data-privacy/software)
- [PCI Compliance Software](https://www.softwareadvice.co.nz/directory/4304/pci-compliance/software)
- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)
- [Encryption Software](https://www.softwareadvice.co.nz/directory/4659/encryption/software)

## Alternatives

1. [Splunk Enterprise](https://www.softwareadvice.co.nz/software/234262/splunk-enterprise) — 4.6/5 (259 reviews)
2. [Klarytee](https://www.softwareadvice.co.nz/software/444828/klarytee) (0 reviews)
3. [iQ.Suite aaS](https://www.softwareadvice.co.nz/software/357153/iq-suite-aas) (0 reviews)
4. [ESET Endpoint Security](https://www.softwareadvice.co.nz/software/134149/eset-endpoint-security) — 4.7/5 (1169 reviews)
5. [GoodAccess](https://www.softwareadvice.co.nz/software/186523/goodaccess) — 4.9/5 (103 reviews)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/software/346042/encryptright)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/encryption/encryptright-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/346042/encryptright> |
| en-GB | <https://www.softwareadvice.co.uk/software/346042/encryptright> |
| en-IE | <https://www.softwareadvice.ie/software/346042/encryptright> |
| en-NZ | <https://www.softwareadvice.co.nz/software/346042/encryptright> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"EncryptRIGHT","description":"EncryptRIGHT simplifies application level data protection by abstracting data protection policies from application programming, while providing a complete separation of duties between information security and application programming.  Leveraging a Data Security Governance approach, EncryptRIGHT defines and enforces how data is protected, who may access specific data, and what format that data will take when access is granted (unrestricted, partially masked or fully restricted).\n\nA unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy. EncryptRIGHT protects the data at the application layer with the encryption or tokenization techniques, formats and methodologies defined in the data protection policy. Role-based access controls are applied to unsecure data in the exact format authorized for specific applications or users – fully restricted, unrestricted or partially concealed with the appropriate data mask dynamically applied. Managing cryptographic keys in and across applications can be very complicated, but EncryptRIGHT centralizes and automates cryptographic key management.\n\nData protection policies are automatically and uniformly enforced, and built-in audit and reporting functionality provides traceability and alerting to assure that data is secured, privacy is protected, and compliance is met. Support for a variety of interfaces, from COBOL to C# and Java, from CLI to Web API, allows programmers to connect using the interfaces with which they are most comfortable, and out-of-the-box functionality for every common enterprise operating system, from IBM mainframe to Windows, means less customization and quicker implementations wherever enterprise applications run, on premise or in the cloud. With EncryptRIGHT, protecting data where it is most exposed and susceptible to risk has never been so easy.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/aa517cd4-c149-4d95-b3a1-5f155a89d706.png","url":"https://www.softwareadvice.co.nz/software/346042/encryptright","@type":"SoftwareApplication","@id":"https://www.softwareadvice.co.nz/software/346042/encryptright#software","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"offers":{"price":"29900","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Windows, Linux, Windows on premise, Linux on premise"},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Data Privacy Software","position":2,"item":"/directory/4523/data-privacy/software","@type":"ListItem"},{"name":"EncryptRIGHT","position":3,"item":"/software/346042/encryptright","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/software/346042/encryptright#breadcrumblist"}]}
</script>
