PDS LOGO
Personal Data Security - PDS
Software to Fight Identity Theft and Cybercrime
Home | Get Started | Cipher License | Videos | Compare | Threats | Wiki

COMPARE PDS WITH ...

As products all have their strengths and weaknesses, these tables attempt to demonstrate the strengths of PDS. Please note that any errors or missing applications is not intentional. For a more comprehensive list of features in PDS, please see the PDS Feature Matrix.


APPLICATIONS THAT MANAGE PASSWORDS

FEATURES SELECTED DESKTOP ENCRYPTION APPLICATIONS







APPLICATIONS THAT SUPPORT ENCRYPTED BACKUPS

FEATURES SELECTED DESKTOP ENCRYPTION APPLICATIONS
PDS AxCrypt Privacy Toolbox WinZip 7-Zip Duplicity ZBackup

SUPPORTED ENVIRONMENTS

Apple Mac Y N N N Y Y Y
Microsoft Windows Y N N Y Y ? ?
Linux Y Y Y Y Y N N
Install and run from a USB drive Y ? ? ? Y Y Y

ENCRYPTION / DECRYPTION

Secure text editor for notes and passwords Y N N N N N N
Secure encryption of individual files Y Y Y Y Y Y Y
Secure verification of encrypted files Y N N N N N N
Secure encryption of directories Y N N Y Y Y Y
Secure verification of encrypted directories Y N N N N N N
Decrypt a subset of an encrypted directory Y N N Y Y ? ?
Encrypt and decrypt using tape devices Y N N N N N N
Append encrypted entries to tape devices Y N N N N N N

KEY MANAGEMENT

Create keystores Y N N N N N N
Generate highly random encryption keys Y ? ? Y Y ? ?
Save multiple encryption keys in a keystore Y N N N N N N
Re-use encryption keys Y ? ? N N N N
View encryption keys Y N N N N N N
Edit encryption keys Y N N N N N N
Delete encryption keys Y N N N N N N

ADDITIONAL FEATURES

Graphical user interface Y Y Y Y ?* N N
Secure password generator Y N N N N N N
Include (optionally) timestamps when encrypting Y N N N N N N
Benefits from the advantages of Java Y N N N N N N


( * ) - Depends upon the Operating System.




APPLICATIONS THAT MANAGE PASSWORDS AND SUPPORT ENCRYPTED BACKUPS

PLEASE LET US KNOW OF IF YOU KNOW OF ANY


Valid HTML 4.01 Transitional