Software Alternatives & Reviews

GPGTools VS Kaspersky Endpoint Security

Compare GPGTools VS Kaspersky Endpoint Security and see what are their differences

GPGTools logo GPGTools

Use GPG Suite to encrypt, decrypt, sign and verify files or messages.

Kaspersky Endpoint Security logo Kaspersky Endpoint Security

Our HuMachine™-based, Next Generation endpoint security delivers multi-layered protection for multiple platforms – including Linux servers and endpoints – to detect suspicious behavior and block threats, including ransomware.
  • GPGTools Landing page
    Landing page //
    2022-07-29
  • Kaspersky Endpoint Security Landing page
    Landing page //
    2023-03-19

GPGTools videos

GPGTools - complete video instructions for use.

More videos:

  • Review - GPGTools encrypt text selection and Setting up services

Kaspersky Endpoint Security videos

Part 1: What constitutes Kaspersky Endpoint Security Cloud

More videos:

  • Review - Introducing Kaspersky Endpoint Security for Business
  • Review - Kaspersky Endpoint Security for Business Webinar (2016 Update)

Category Popularity

0-100% (relative to GPGTools and Kaspersky Endpoint Security)
Security & Privacy
38 38%
62% 62
Monitoring Tools
0 0%
100% 100
Encryption
100 100%
0% 0
Office & Productivity
0 0%
100% 100

User comments

Share your experience with using GPGTools and Kaspersky Endpoint Security. For example, how are they different and which one is better?
Log in or Post with

Social recommendations and mentions

Based on our record, GPGTools seems to be more popular. It has been mentiond 32 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

GPGTools mentions (32)

  • Tools that keep me productive
    If you're using Git, which I imagine most of you are, signing your commits is super important. GPG Suite makes this easy to set up. - Source: dev.to / 3 days ago
  • What is the point of a public key fingerprint?
    I use to use this plugin: https://gpgtools.org/. - Source: Hacker News / 5 months ago
  • I've Had A Hard Time Finding An Open Source Encryption App For Mac
    GpgTools and finder will allow you to all this, albeit in a slightly different way. Source: 11 months ago
  • How can I avoid the government screening my messages?
    GPG Tools is what I would recommend, it's free and can be found at: gpgtools.org. Source: about 1 year ago
  • Guide on storing your private keys in a manner allowing you to store secret keys online SECURELY. Even if you are hacked, your keys are SAFE.
    First of all, you will need some sort of PGP encryption suite whether you are on Mac or Windows. I use Windows, so I utilize the Kleopatra PGP client in GPG4Win. Download GPG4Win and then follow these instructions on how to generate a public and private encryption key for yourself. If you use Mac, I would suggest using GPGSuite and to follow these instructions on how to set up your public and private encryption... Source: about 1 year ago
View more

Kaspersky Endpoint Security mentions (0)

We have not tracked any mentions of Kaspersky Endpoint Security yet. Tracking of Kaspersky Endpoint Security recommendations started around Mar 2021.

What are some alternatives?

When comparing GPGTools and Kaspersky Endpoint Security, you can also consider the following products

GnuPG - GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP).

LogMeIn Central - LogMeIn Central is a comprehensive endpoint management software that easily helps IT professionals manage and monitor their organization’s endpoint infrastructure.

Kleopatra - Kleopatra is a certificate manager and GUI for GnuPG.

Panda Security - Panda Security is an antivirus and cyber security solution.

Pignus Encryption - Pignus Encryption is an encryption platform that allows users to encrypt their messages and documents.

ESET Endpoint Security - ESET internet security solutions deliver proactive, multi-layered protection, including antivirus, anti-phishing, exploit blocker and more, to protect the business from all known and emerging malware and threats.