- Endpoint encryption has been around since the early 1990s; however, vendors have only started getting into the encryption game, mainly through acquisitions.
- With every vendor claiming they have the most comprehensive solution, it can be difficult to differentiate between solutions.
- Product selection should be based on more than just a big-name vendor. Endpoint encryption is just a part of vendors' now broad product portfolios. Organizations looking for dedicated product focus and support may want to put those considerations up front when evaluating vendors.
Our Advice
Critical Insight
- Endpoint Encryption needs to go beyond basic file/folder encryption. Breadth of platform coverage is important in product evaluation. A solution's ability to integrate with a range of operating systems (Windows, Mac, BitLocker, self-encrypting drives, iOS and Android mobile devices) is imperative to ease of deployment and use.
- Also related to mobile devices, encryption solutions need to recognize data’s increasingly mobile tendencies by encrypting data at rest and in transit, through USB devices and on smartphones.
- Price is a differentiator in this space. The highest price from the biggest vendor does not always mean the best product. Organizations need to conduct their due diligence in their evaluation of the product's full capabilities, the vendor's stability and support, and the price to get the best product for their specific requirements.
Impact and Result
- Implementing feature-rich Endpoint Encryption solutions is an important step in an organization's overall security strategy.
- Selecting the optimal solution ensures the greatest level of data protection.