• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • API Management
      • View All
    • Artificial Intelligence

      • Generative AI Knowledge Management Apps/General Productivity
      • AI Code Assistants (Transitioning to AI Coding Agents)
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Hybrid Cloud Storage
      • Primary Storage Platforms
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Data and Analytics Governance Platforms
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • SD-WAN
      • Intranet Packaged Solutions
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Managed Detection and Response
      • Email Security
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Visual Collaboration Applications
      • Collaborative Work Management
      • Meeting Solutions
      • Knowledge Management (KM) Software
      • View All
    • Public Sector and Government

      • Cloud-Based ERP for U.S. Local Government
      • Government Budgeting and Planning Solution
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications
      • Digital Shelf Analytics
      • View All
    • Sales

      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Advanced Distribution Management Systems
      • Asset Investment Planning Solutions for Energy and Utilities (Transitioning to Asset Investment Planning Solutions)
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • API Management
      • AI-Augmented Software Testing Tools
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • Business Process Automation Tools
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Enterprise Architecture Tools
      • Custom Software Development Services
      • Code Review Tools
      • Business Orchestration and Automation Technologies
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Code Modernization Tools
      • Digital Twin of an Organization Platforms
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Event Brokers
      • Application Integration Platforms
      • Green Software Engineering
      • Virtual Reality Development Software
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Portfolio Management Tools
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Load Testing Tools
      • AI Agent Development Platforms for Software Engineering
      • Blockchain Consulting and Proof-of-Concept Development Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Information-Centric Endpoint and Mobile Protection (Transitioning to Endpoint Protection Platforms)

Information-Centric Endpoint and Mobile Protection Reviews and Ratings

What is Information-Centric Endpoint and Mobile Protection?

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 20 of 23
Sort by
Logo of Microsoft BitLocker

Microsoft BitLocker

By Microsoft

4.7
(121 Ratings)

Microsoft BitLocker is a disk encryption software designed to protect data by providing encryption for entire volumes. The software integrates with operating systems to help prevent unauthorized access to data stored on the system, even if the device is lost or stolen. BitLocker uses advanced encryption algorithms and can leverage hardware-based security features such as Trusted Platform Module. It supports management and recovery options for enterprise environments and helps address compliance requirements for data protection. The software is suitable for organizations seeking to safeguard sensitive information against potential threats related to physical device theft or unauthorized data exposure.

Show More Details
Logo of SecureDoc

SecureDoc

By WinMagic

4.7
(75 Ratings)

SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).

Show More Details
Logo of Seclore Rights Management

Seclore Rights Management

By Seclore

4.5
(57 Ratings)

Seclore Rights Management is a software designed to enable organizations to protect and control access to sensitive digital information across various platforms. It offers features that allow users to define and enforce usage policies on documents, emails, and other files, ensuring that only authorized individuals can view, edit, share, or print content. The software integrates with enterprise systems and provides audit trails for compliance requirements. By automating rights management processes, it aims to address business challenges related to information security, data governance, and regulatory compliance, supporting secure collaboration and mitigating risks associated with unauthorized data exposure.

Show More Details
Logo of Virtru Data Protection

Virtru Data Protection

By Virtru

4.8
(36 Ratings)

Protect sensitive data flowing in and out of your organization via email. Virtru provides end-to-end encryption, granular access controls, and DLP for Google Gmail and Microsoft Outlook. Virtru’s technology is FedRAMP authorized and FIPS 140-2 validated, providing military-grade security to support compliance with the world’s strictest regulations, including CMMC 2.0, ITAR, CJIS, GLBA, HIPAA, and more.

Virtru’s client-side encryption tools are easy to use, integrating seamlessly with Gmail and Outlook. For recipients, there are no new accounts to create and no software to install.

Virtru gives you control over data even after it’s left your organization: Add advanced controls like an expiration date, watermark, or preventing download — and revoke access at any time. Deploy automated, behind-the-scenes encryption and decryption flows with the server-side Virtru Data Protection Gateway for audit and data assurance.

Show More Details
Logo of Trend Micro Endpoint Encryption

Trend Micro Endpoint Encryption

By Trend Micro

4.9
(18 Ratings)

Trend Micro Endpoint Encryption is a software designed to secure data stored on endpoints such as laptops, desktops, and removable media through encryption and access management. The software helps organizations protect sensitive information by encrypting files, folders, and entire disks, thereby reducing the risk of unauthorized access, data breaches, and loss of confidential data in case of device theft or misplaced storage media. It supports centralized policy management, reporting, and compliance requirements while offering flexible deployment and integration with existing IT infrastructure. This software addresses critical business challenges related to data privacy, regulatory compliance, and information security across distributed workforces.

Show More Details
Logo of Dell Data Protection

Dell Data Protection

By Dell Technologies

4.3
(15 Ratings)

Dell Data Protection is a software designed to secure and manage data across devices within an organization. The software provides features such as encryption, advanced authentication, and threat prevention to protect sensitive information both at rest and in transit. It enables the enforcement of security policies, management of encryption keys, and compliance with regulatory requirements, addressing business challenges related to data breaches and unauthorized access. Dell Data Protection integrates with endpoint management systems and works with various operating environments, supporting organizations in maintaining data confidentiality, integrity, and availability as part of their information security strategy.

Show More Details
Logo of Sophos SafeGuard

Sophos SafeGuard

By Sophos

4.8
(15 Ratings)

Sophos SafeGuard is a software designed to protect sensitive data through encryption and access control across multiple platforms. It provides full disk, file, and cloud encryption to prevent unauthorized access to confidential information stored on devices and in cloud environments. The software enables organizations to enforce data security policies and ensure compliance with regulatory requirements by automating encryption processes and managing encryption keys centrally. Sophos SafeGuard integrates with endpoint security solutions to facilitate secure data sharing and streamline workflows, helping businesses mitigate risks associated with data loss or theft. It supports various device types, including desktops, laptops, and removable media, and offers reporting capabilities to monitor encryption and compliance status.

Show More Details
Logo of SealPath Smart Data Protection

SealPath Smart Data Protection

By SealPath

4.4
(11 Ratings)

SealPath Full Information Protection keeps any file extension secure, under control, and accessible by the right people. Its advanced information protection deploys a layer of security that travels with the data allowing you to control remotely the permissions over the documents (Office, CAD, PDF, etc.). It also offers advanced real-time incident response and monitoring controls, such as, remotely revoking access permissions and detailed reports of who is accessing. With SealPath you will get 24/7 peace of mind, protecting you against data leakage and unauthorized access. SealPath can be deployed in a simplified manner in SaaS or On-Premise and requires minimal time and resource allocation, working seamlessly with systems. SealPath's data protection tool has been designed to provide ease of use and maximize user-friendly interaction. Simplify your information protection journey with SealPath.

Show More Details
Logo of Trend Micro Smart Protection Suites

Trend Micro Smart Protection Suites

By Trend Micro

4.7
(10 Ratings)

Trend Micro Smart Protection Suites is a security software designed to defend endpoints, email, web, and SaaS applications against threats such as malware, ransomware, phishing, and targeted attacks. The software integrates advanced detection techniques including behavioral analysis, application control, and intrusion prevention to protect devices and data across multiple environments. It helps organizations manage vulnerabilities, enforce security policies, and ensure compliance by providing centralized management and automated protection. The software solves business challenges related to information security, minimizing risk from cyber threats and facilitating secure access to critical resources for users operating both within and outside the corporate network.

Show More Details
Logo of Sophos Mobile

Sophos Mobile

By Sophos

4.5
(7 Ratings)

Sophos Mobile is a software designed to support organizations in managing and securing mobile devices across various platforms, including Android, iOS, and Windows. The software offers features such as mobile device management, mobile application management, and mobile content management. It enables administrators to configure device settings, deploy and manage applications, enforce security policies, and control access to corporate resources. Sophos Mobile addresses business challenges related to data protection, compliance, and cybersecurity by providing mechanisms for remote device locking and wiping, encrypting sensitive information, and detecting threats. The software integrates with existing IT infrastructure and aims to streamline mobility management while mitigating risks associated with mobile endpoints.

Show More Details
Logo of Symantec Desktop Email Encryption

Symantec Desktop Email Encryption

By Broadcom

5
(6 Ratings)

Symantec Desktop Email Encryption is a software designed to secure email communications by providing encryption for messages and attachments sent from desktop clients. The software enables users to maintain the confidentiality and integrity of sensitive information shared via email by encrypting content before it leaves the desktop environment. Through the use of public key infrastructure, the software supports recipient authentication and prevents unauthorized access to email data. It streamlines compliance with regulatory standards and helps organizations address risks associated with the transmission of confidential business information. The software integrates with popular email applications and provides options for policy-based encryption, automated key management, and user transparency, thereby supporting protection of data from threats such as eavesdropping and interception.

Show More Details
Logo of Symantec Endpoint Encryption (SEE)

Symantec Endpoint Encryption (SEE)

By Broadcom

4.9
(6 Ratings)

Symantec Endpoint Encryption is a software designed to protect sensitive data on endpoints through encryption of hard drives and removable media. It offers centralized management for deploying encryption policies, monitoring compliance, and handling recovery processes across devices within an organization. The software supports integration with authentication solutions and allows administrators to enforce data protection protocols to reduce risks associated with data loss or unauthorized access. Symantec Endpoint Encryption addresses the business problem of data security and regulatory compliance by safeguarding information stored on endpoints, even in cases of device theft or loss, while enabling organizations to manage encryption operations efficiently.

Show More Details
Logo of Kiteworks

Kiteworks

By Kiteworks

4.6
(3 Ratings)

Kiteworks is a software designed to facilitate secure file sharing, transfer, and collaboration across organizations. It provides tools for managing sensitive information exchange by enabling users to control, monitor, and audit file activity from a centralized platform. The software offers features such as encryption, role-based access controls, and compliance reporting to help organizations meet regulatory requirements related to information security. Kiteworks integrates with email, file storage, and content management systems to streamline workflows and reduce the risk of data breaches. The software helps address business problems related to data privacy, regulatory compliance, and secure communication.

Show More Details
Logo of Symantec File Share Encryption (Legacy)

Symantec File Share Encryption (Legacy)

By Broadcom

4.3
(3 Ratings)

Symantec File Share Encryption (Legacy) is a software that provides encryption capabilities for protecting sensitive data stored in shared folders and network file shares. The software is designed to enable secure collaboration by allowing authorized users to access encrypted files while preventing unauthorized access. It supports transparent encryption, so files remain protected regardless of their location or transfer method. The software addresses the business need to safeguard confidential information from data breaches and unauthorized disclosure, supporting compliance with data protection regulations. Symantec File Share Encryption integrates with existing authentication infrastructure and offers centralized management for administrators to enforce encryption policies and manage user access rights.

Show More Details
Logo of BlackBerry Enterprise Mobility Suite

BlackBerry Enterprise Mobility Suite

By BlackBerry

3.5
(2 Ratings)

BlackBerry Enterprise Mobility Suite is a software that offers unified endpoint management capabilities, enabling organizations to securely manage and control a wide range of devices, including smartphones, tablets, laptops, and desktops across diverse operating systems. The software provides features such as device and application management, secure file sharing, identity and access management, as well as collaboration tools. It aims to address business needs related to securing corporate data, enforcing compliance policies, and facilitating secure communication among employees. The software also supports mobile threat detection, containerization, and integration with productivity applications, helping organizations manage mobile workflows and protect sensitive information in a variety of enterprise environments.

Show More Details
Logo of Dell Endpoint Security Suite Enterprise

Dell Endpoint Security Suite Enterprise

By Dell Technologies

5
(1 Rating)

Dell Endpoint Security Suite Enterprise is a software designed to protect endpoints by integrating threat prevention, encryption, and advanced authentication. The software provides protection against malware and unauthorized access, utilizing behavioral analysis and machine learning to identify potential threats. It includes encryption features to safeguard sensitive data stored on devices and supports management of security policies across distributed environments. The software aims to address business challenges around data security, compliance, and risk management by offering centralized controls for monitoring and responding to security incidents across endpoint devices in an organization.

Show More Details
Logo of Microsoft Purview Information Protection

Microsoft Purview Information Protection

By Microsoft

4
(1 Rating)

Microsoft Purview Information Protection is a software that enables organizations to discover, classify, and protect sensitive information across various locations such as emails, documents, and cloud services. The software utilizes data classification, labeling, and encryption to help comply with data privacy regulations and prevent unauthorized access. It provides automated policies for detecting and managing confidential data, and integrates with other Microsoft solutions to support collaboration while safeguarding business information. Through centralized management and auditing capabilities, the software assists businesses in addressing challenges related to the security and governance of data in digital environments.

Show More Details
Logo of Symantec Information Centric Encryption

Symantec Information Centric Encryption

By Broadcom

5
(1 Rating)

Symantec Information Centric Encryption is a software designed to protect sensitive data by enabling encryption at the file level both inside and outside of organizational boundaries. The software provides capabilities for persistent data protection, allowing files to remain encrypted regardless of where they travel. It offers policy-driven encryption and access controls, supporting the management of permissions to ensure only authorized individuals can access protected information. This software addresses business challenges related to data security, compliance requirements, and the risks associated with data sharing and collaboration. It integrates with existing workflows, enabling organizations to enforce encryption policies seamlessly and monitor data usage to reduce the likelihood of data breaches or unauthorized disclosures.

Show More Details
Logo of DriveLock

DriveLock

By Center Tools

DriveLock is a software developed to address endpoint security by providing features such as device control, encryption, application control, and protection against unauthorized data access. The software enables organizations to safeguard sensitive information and manage the use of external devices within a network. It monitors and enforces policies that help prevent data loss and unauthorized software execution, contributing to compliance with regulatory requirements. DriveLock also offers centralized management and reporting capabilities, allowing administrators to oversee security measures across multiple endpoints in diverse environments. The software is designed to support organizational needs related to data protection, risk management, and security posture improvement.

Be the first to .
Logo of EgoSecure Data Protection

EgoSecure Data Protection

By EgoSecure

EgoSecure Data Protection is a software solution designed to secure sensitive business data across endpoints within an organization. It offers features including encryption, access control, device management, and data loss prevention to address the challenge of unauthorized data access and leakage. The software enables administrators to define security policies and monitor compliance through centralized management. By integrating automation and analytics, the software helps organizations detect risks and track user activities related to data usage and movement. It supports regulatory requirements by providing reporting and audit capabilities, contributing to the protection of confidential information while maintaining organizational productivity.

Be the first to .

Gartner Research

Market Guide for Information-Centric Endpoint and Mobile Protection (Transitioning to Endpoint Protection Platforms)

Top Trending Products

Virtru Data Protection

Popular Product Comparisons

Microsoft BitLocker vs SecureDocMicrosoft BitLocker vs Seclore Rights ManagementSeclore Rights Management vs SecureDocSeclore Rights Management vs Trend Micro Endpoint EncryptionSeclore Rights Management vs Virtru Data ProtectionDell Data Protection vs Microsoft BitLockerMicrosoft BitLocker vs Trend Micro Endpoint EncryptionSeclore Rights Management vs Sophos SafeGuard

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.