Software Alternatives, Accelerators & Startups

Thales Data Encryption VS SRX firewalls

Compare Thales Data Encryption VS SRX firewalls and see what are their differences

Thales Data Encryption logo Thales Data Encryption

Thales provides your organization with security and trust in data wherever data is created, shared or stored without impacting business agility.

SRX firewalls logo SRX firewalls

Protect your small branch office, midsize enterprise, large data center, or cloud applications with Juniper next-generation firewalls and virtual firewalls.
  • Thales Data Encryption Landing page
    Landing page //
    2023-05-12
  • SRX firewalls Landing page
    Landing page //
    2023-08-20

Category Popularity

0-100% (relative to Thales Data Encryption and SRX firewalls)
Monitoring Tools
14 14%
86% 86
Security & Privacy
4 4%
96% 96
Cloud Storage
100 100%
0% 0
Machine Data Analytics
100 100%
0% 0

User comments

Share your experience with using Thales Data Encryption and SRX firewalls. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Thales Data Encryption and SRX firewalls, you can also consider the following products

Symantec Data Loss Prevention - Fully protect your data with the comprehensive detection technologies and unified policies of Symantec's industry leading Data Loss Prevention (DLP).

F5 Advanced Firewall Manager - Stop even the most massive and complex DDoS attacks with BIG-IP Advanced Firewall Manager: advanced data center protection against layer 3–4 threats.

Microsoft BitLocker - BitLocker is a full disk encryption feature included with Windows Vista and later.

Palo Alto Next-Generation Firewall - Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats.

Paubox - Paubox provides HIPAA compliant email encryption without the hassle of extra steps.

McAfee Network Security Platform - McAfee Network Security Platform guards all your network-connected devices from zero-day and other attacks, with a cost-effective network intrusion prevention system.