• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Information-Centric Endpoint and Mobile Protection (Transitioning to Endpoint Protection Platforms)

Information-Centric Endpoint and Mobile Protection Reviews and Ratings

What is Information-Centric Endpoint and Mobile Protection?

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 23
Sort by
Logo of Microsoft BitLocker

Microsoft BitLocker

By Microsoft

4.7
(121 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of SecureDoc

SecureDoc

By WinMagic

4.7
(75 Ratings)

WinMagic has been protecting endpoints for over 25 years though full disk encryption and secure authentication. MagicEndpoint unlocks the endpoint at preboot with MFA (password, smart card, USB token, biometrics, PKI, TPM) and provides a passwordless solution via Single Sign on (SSO). Our secure authentication enhances FIDO2 standard, adheres to zero-trust framework, and supports federated authentication with our IdP. It provides a persistent connection by continuously verifying the endpoint’s security posture plus the user’s intent, in addition to supporting device signals to ensure compliance with security policies. By using cryptography for prevention, the company aims to significantly decrease IT costs, optimise user experience, and simplify cybersecurity. It is resolved to continue offering feature-rich solutions in encryption and passwordless authentication.

Show More Details
Logo of Seclore Rights Management

Seclore Rights Management

By Seclore

4.6
(57 Ratings)

Seclore is a company that specializes in safeguarding sensitive data. Their core focus is on closing the data security gap within enterprises to prevent data theft and achieve regulatory compliance. The organization adopts a data-centric approach to security, ensuring only authorized personnel have access to vital digital assets both inside and outside their respective enterprises. Seclore has an automated policy setting mechanism that empowers users to regulate access, define the extent of access, and mandate the duration of such access.

Show More Details
Logo of Virtru Data Protection

Virtru Data Protection

By Virtru

4.8
(34 Ratings)

Virtru empowers organizations to easily unlock the power of data while maintaining control everywhere it’s stored and shared. More than 6,700 global customers trust Virtru to power their data-centric, Zero Trust strategies and safeguard their most sensitive data in accordance with the world’s strictest security standards. Virtru’s data-centric security solutions provide military-grade encryption and granular acces control within everyday business apps like Gmail, Outlook, Confluence, Zendesk, Google Drive, and many more.

Show More Details
Logo of Trend Micro Endpoint Encryption

Trend Micro Endpoint Encryption

By Trend Micro

4.9
(18 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Dell Data Protection

Dell Data Protection

By Dell Technologies

4.4
(15 Ratings)

Dell Technologies helps organizations build their digital futures and individuals transform how they work, live, and play. It provides customers with a broad solutions portfolio for the data era, including traditional infrastructure and extending to multicloud environments. Dell's integrated solutions help customers modernize their IT infrastructure, manage and operate in a multicloud world, address workforce transformation, and provide critical solutions that keep people and organizations connected. It helps customers accelerate their digital transformations to improve and strengthen business and workforce productivity. With an extensive portfolio and a commitment to innovation, Dell offers secure, integrated solutions that extend from the edge to the core to the cloud, and offers software-defined and cloud native infrastructure solutions.

Show More Details
Logo of Sophos SafeGuard

Sophos SafeGuard

By Sophos

4.8
(15 Ratings)

Sophos is a global provider of advanced cybersecurity solutions. Their main focus is the delivery of an extensive range of security technologies including Managed Detection and Response (MDR), incident response services, as well as endpoint, network, email, and cloud security systems. These products and services are designed to help organizations combat various cyber threats such as active adversaries, ransomware, phishing, and malware. The company offers fully-managed, turnkey security solutions, providing cybersecurity-as-a-service to organizations worldwide. Moreover, Sophos hosts a cloud-based management console, known as Sophos Central, and supports the Sophos X-Ops, a cross-domain threat intelligence unit. The unit enriches the Sophos Adaptive Cybersecurity Ecosystem by optimizing its centralized data lake with a powerful set of open APIs. Sophos' operations are globally distributed and the company's headquarters are in Oxford, U.K.

Show More Details
Logo of SealPath Smart Data Protection

SealPath Smart Data Protection

By SealPath

4.4
(11 Ratings)

SealPath serves as a facilitator for businesses to adopt a data-centric approach by providing solutions to simplify the handling and protection of business information. Recognizing the digital transformation trend and data mobility in today's interconnected world, SealPath has developed advanced offerings to effectively guard against data leaks and safeguard sensitive information. Through their tools, the control and protection of documents is possible regardless of their location - within a computer, a corporate network, a partner's system, or the cloud. Importantly, this holds true even when documents are transferred or shared beyond the realm of the IT department.

Show More Details
Logo of Trend Micro Smart Protection Suites

Trend Micro Smart Protection Suites

By Trend Micro

4.6
(10 Ratings)

Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.

Show More Details
Logo of Sophos Mobile

Sophos Mobile

By Sophos

4.5
(7 Ratings)

Sophos is a global provider of advanced cybersecurity solutions. Their main focus is the delivery of an extensive range of security technologies including Managed Detection and Response (MDR), incident response services, as well as endpoint, network, email, and cloud security systems. These products and services are designed to help organizations combat various cyber threats such as active adversaries, ransomware, phishing, and malware. The company offers fully-managed, turnkey security solutions, providing cybersecurity-as-a-service to organizations worldwide. Moreover, Sophos hosts a cloud-based management console, known as Sophos Central, and supports the Sophos X-Ops, a cross-domain threat intelligence unit. The unit enriches the Sophos Adaptive Cybersecurity Ecosystem by optimizing its centralized data lake with a powerful set of open APIs. Sophos' operations are globally distributed and the company's headquarters are in Oxford, U.K.

Show More Details
Logo of Symantec Desktop Email Encryption

Symantec Desktop Email Encryption

By Broadcom

5
(6 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Symantec Endpoint Encryption (SEE)

Symantec Endpoint Encryption (SEE)

By Broadcom

4.9
(6 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of Kiteworks

Kiteworks

By Kiteworks

4.3
(3 Ratings)

Kiteworks empowers organizations to manage risk in every send, share, receive, and use of private data. Its platform provides a Private Data Network that unifies, tracks, controls, and secures sensitive information moving within, into, and out of an organization—ensuring governance, compliance, and protection. Headquartered in Silicon Valley, Kiteworks safeguards over 100 million users and 1,500+ global enterprises and government agencies. With flexible deployment options—on-premises, private cloud, hybrid, and FedRAMP—the platform enables C-suite leaders to meet compliance standards including NIST CSF, HIPAA, SOX, GDPR, GLBA, FISMA, and CMMC 2.0. CIOs, CISOs, and Chief Data Privacy Officers trust Kiteworks for visibility and control over PII, PHI, financial, legal, CUI, and IP data. Across email, file sharing, MFT, web forms, and APIs, Kiteworks ensures every exchange is safe, compliant, and secure.

Show More Details
Logo of Symantec File Share Encryption (Legacy)

Symantec File Share Encryption (Legacy)

By Broadcom

4.5
(3 Ratings)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of BlackBerry Enterprise Mobility Suite

BlackBerry Enterprise Mobility Suite

By BlackBerry

3.5
(2 Ratings)

BlackBerry (NYSE: BB; TSX: BB) provides enterprises and governments the intelligent software and services that power the world around us. Based in Waterloo, Ontario, the company’s high-performance foundational software enables major automakers and industrial giants alike to unlock transformative applications, drive new revenue streams and launch innovative business models, all without sacrificing safety, security, and reliability. With a deep heritage in Secure Communications, BlackBerry delivers operational resiliency with a comprehensive, highly secure, and extensively certified portfolio for mobile fortification, mission-critical communications, and critical events management.

Show More Details
Logo of Dell Endpoint Security Suite Enterprise

Dell Endpoint Security Suite Enterprise

By Dell Technologies

5
(1 Rating)

Dell Technologies helps organizations build their digital futures and individuals transform how they work, live, and play. It provides customers with a broad solutions portfolio for the data era, including traditional infrastructure and extending to multicloud environments. Dell's integrated solutions help customers modernize their IT infrastructure, manage and operate in a multicloud world, address workforce transformation, and provide critical solutions that keep people and organizations connected. It helps customers accelerate their digital transformations to improve and strengthen business and workforce productivity. With an extensive portfolio and a commitment to innovation, Dell offers secure, integrated solutions that extend from the edge to the core to the cloud, and offers software-defined and cloud native infrastructure solutions.

Show More Details
Logo of Microsoft Purview Information Protection

Microsoft Purview Information Protection

By Microsoft

4
(1 Rating)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of Symantec Information Centric Encryption

Symantec Information Centric Encryption

By Broadcom

5
(1 Rating)

Broadcom Inc. is a global entity focusing on the design, development, and supply of semiconductor and infrastructure software solutions. Through these operations, the firm addresses the primary issue of providing efficient top-notch technology-based solutions.

Show More Details
Logo of DriveLock

DriveLock

By Center Tools

Center Tool is a comprehensive machine shop that caters to a broad range of industries across the United States. Focused on manufacturing precision components, the company handles everything from individual tasks to high-volume production. In an effort to maintain rigorous industry standards, Center Tool has achieved ISO 9001:2015 certification. The company is known for delivering specialized components for an array of sectors including aerospace, alternative energy, automation, automotive, government, medical and surgical, prototyping, tool and die, and universities. Over a span of 40 years, Center Tool has established a reliable reputation for delivering quality work within promised timeframes.

Be the first to .
Logo of EgoSecure Data Protection

EgoSecure Data Protection

By EgoSecure

PBCS Group is dedicated to the utilization of innovative technology to bring about new opportunities. They focus on the creation of unique solutions to aid businesses in the bridging of the gap between existing and emerging technologies. Being aware of the constant nature of change, they work to ensure businesses have the necessary IT tools for growth. They also strive to understand diverse business needs and provide efficient and flexible solutions to tackle any business hurdle. The PBCS Group leverages its IT, ESM and consulting capabilities to offer customized, scalable solutions to help businesses navigate complex IT challenges in an ever-evolving technological landscape. They aim to be a dependable advisor by harnessing their expertise through strategic partnerships, committing to transforming industries and overcoming sophisticated IT difficulties.

Be the first to .

Gartner Research

Market Guide for Information-Centric Endpoint and Mobile Protection (Transitioning to Endpoint Protection Platforms)

Top Trending Products

Virtru Data Protection

Popular Product Comparisons

Microsoft BitLocker vs SecureDocMicrosoft BitLocker vs Seclore Rights ManagementSeclore Rights Management vs SecureDocSeclore Rights Management vs Trend Micro Endpoint EncryptionDell Data Protection vs Microsoft BitLockerSeclore Rights Management vs Virtru Data ProtectionMicrosoft BitLocker vs Trend Micro Endpoint Encryption

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.