Information-Centric Endpoint and Mobile Protection Reviews and Ratings

What is Information-Centric Endpoint and Mobile Protection?

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.

Products In Information-Centric Endpoint and Mobile Protection Market

"Security is #1 and we trust Bitlocker"

Overall we use and trust this product to protect our devices. Bitlocker is fairly simple to implement and use from an IT standpoint, and since it's a Microsoft product it's very easy to integrate and rollout. Support is always good for this as well

Read reviews

"Examining WinMagic SecureDoc: The Pros and Cons Revealed"

During the course of time we used WinMagic SecureDoc, we had a very few issues that had to be addressed by the support

Read reviews

"Securing Sensitive Data with Seclore: A Seamless Experience"

Using Seclore Rights management has been transformative for our organization. it ensures our sensitive data is secure, even when shared externally. The platform is user-friendly and integrates seamlessly with our existing systems. we have peace of mind knowing our information in protecting enhancing both security and productivity. highly recommended

Read reviews

"Trend Micro Endpoint Encryption - a reliable encryption"

Trend Micro Endpoint Encryption helped our team to easily deploy and monitor encryption in our organization. It's easy to use yet it has wide range support to different encryption algorithm. Its password recovery and self decrypting file features really helped us save time in encrypting data.

Read reviews

"Sophos SafeGuard: Protecting your Data"

Since we implemented Sophos SafeGuard, we have the assurance that our information traffic is secure and protected. This provides us with peace of mind and calm.

Read reviews

"Advanced Protection Solutions"

It helps to protect the data. Also enable users to work as per their convenience on any device. It helps to protect system disks. Also useful for remote management.

Read reviews

"Enhancing Confidentiality with Virtru: An Exploration of Email Encryption"

Virtru has been a game-changer for the company's email security and confidential document sharing. Overall, Virtru has significantly improved our email security and document sharing practices. There are three solutions used which are Gmail, Secure sharing portal, and Virtru with Zendesk the goal is to provide users with peace of mind when handling sensitive information.

Read reviews

"Trend Micro Smart Protection Review"

The experience with Trend Micro smart protection is very good. The product offers many features in a single suite.

Read reviews

"Sophos Mobile - Securing your device and data! "

Great security features offering granular device management enhancing organisational security

Read reviews

"Provides Secure E-mail communication with using PKI Infastructure"

We have implemented this application to communicate securely with another company. Installation is very easy. After installing the application, public and private keys will be created to use secure communication. Symantec Encryption Desktop application can be able to encrypt your email or attachments. However, all users who will communicate securely with each other must have this application on their computer. And also they should share their Public keys. Data will not be accessible if we lost the keys. So keys backup is very important.

Read reviews

"Best in industry and has all necessary features with good support."

Easy to manage all machines with single dashboard. Server requirements are minimum. Can be implemented from cloud as well as from on premise. Works on Mac as well as on Windows. It is costly as compare to Mcafee.

Read reviews

"Very good solution"

Efficient software, good recommendations.We opted for this solution to encrypt and protect sensitive documents, and we are very pleased with the choice.

Read reviews

"Great way to send files securely."

My favorite part about kiteworks is powerful Office 365 integration. I can use my favorite applications to create documents with a high level of security. Kiteworks works great.

Read reviews
Competitors and Alternatives
Kiteworks vs MicrosoftSee All Alternatives

"Protect your critical file types with PGP Client"

File Share Encryption is very good solution to encrypt business critical files on the end users machines. We have defined some file type extension to encrypt automatically on the client Machines and unauthorized users cannot access this encrypted files without correct keys. There is no any noticable latency while accessing to encrypted files by the PGP Client.

Read reviews

"Comfort"

Blackberry enterprise mobility suite provides unique and innovative solutions to the most important aspects and to customers with the best customer service quality. The best way to get competitive and affordable with the client and easily reachable to them

Read reviews

"Securing Physical and Virtual Endpoint Devices and the Data On Them was Seemless!"

Working with Dell directly was a great experience. They have done Endpoint Security forever and the planning, deployment and follow-up was a breeze. The 3rd party vendor we used (not named here) was not the best but Dell intervened and everything came out fine in the end.

Read reviews

"Encrypting files sent outside the organization. "

In our organization, Symantec Information Centric Encryption allows us to secure confidential information sent outside our organization. User and administrator interface are very easy to use. The system works very well and integrates with Symantec DLP.

Read reviews
Products 1 - 18