Get Instant Access
to This Blueprint

Product Comparisons And Evaluations icon

Vendor Landscape: Endpoint Encryption

Encryption from endpoint to endpoint, mobile and more.

  • Endpoint encryption has been around since the early 1990s; however, vendors have only started getting into the encryption game, mainly through acquisitions.
  • With every vendor claiming they have the most comprehensive solution, it can be difficult to differentiate between solutions.
  • Product selection should be based on more than just a big-name vendor. Endpoint encryption is just a part of vendors' now broad product portfolios. Organizations looking for dedicated product focus and support may want to put those considerations up front when evaluating vendors.

Our Advice

Critical Insight

  • Endpoint Encryption needs to go beyond basic file/folder encryption. Breadth of platform coverage is important in product evaluation. A solution's ability to integrate with a range of operating systems (Windows, Mac, BitLocker, self-encrypting drives, iOS and Android mobile devices) is imperative to ease of deployment and use.
  • Also related to mobile devices, encryption solutions need to recognize data’s increasingly mobile tendencies by encrypting data at rest and in transit, through USB devices and on smartphones.
  • Price is a differentiator in this space. The highest price from the biggest vendor does not always mean the best product. Organizations need to conduct their due diligence in their evaluation of the product's full capabilities, the vendor's stability and support, and the price to get the best product for their specific requirements.

Impact and Result

  • Implementing feature-rich Endpoint Encryption solutions is an important step in an organization's overall security strategy.
  • Selecting the optimal solution ensures the greatest level of data protection.

Vendor Landscape: Endpoint Encryption Research & Tools

1. Understand the Endpoint Encryption market space

Understand Endpoint Encryption solutions, their capabilities, and cost.

2. Review Endpoint Encryption solutions

Build a shortlist of best-fit Endpoint Encryption tools for the enterprise.

Vendor Landscape: Endpoint Encryption preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research

Author

Jessica Ireland

Contributors

  • Roger Davis, Alvarez and Marsal
  • Walid Ayoub, Human Rights Watch
  • Luke Peters, Allegiance Health
  • Billy Gibson, Financial Resources Federal Credit Union
  • Nathan Reisdorff, New England School of Law
  • Paul Boissonne, CHEO LHIN
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019