Information-Centric Endpoint and Mobile Protection Reviews and Ratings
What is Information-Centric Endpoint and Mobile Protection?
Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.
Product Listings
Filter by
Microsoft BitLocker is a disk encryption software designed to protect data by providing encryption for entire volumes. The software integrates with operating systems to help prevent unauthorized access to data stored on the system, even if the device is lost or stolen. BitLocker uses advanced encryption algorithms and can leverage hardware-based security features such as Trusted Platform Module. It supports management and recovery options for enterprise environments and helps address compliance requirements for data protection. The software is suitable for organizations seeking to safeguard sensitive information against potential threats related to physical device theft or unauthorized data exposure.
SecureDoc is an encryption and security management solution designed to safeguard data at rest (DAR). The software has two components: client software for encrypting and decrypting data and server software for configuration and management across the organization's laptops, desktops, servers and external devices. Using a FIPS 140-2 validated AES 256-bit cryptographic engine, SecureDoc ensures compliance with industry regulations and data integrity. With features like pre-boot authentication and central management, the software seamlessly protects sensitive information on various platforms (Windows, macOS and Linux).
Seclore Rights Management is a software designed to enable organizations to protect and control access to sensitive digital information across various platforms. It offers features that allow users to define and enforce usage policies on documents, emails, and other files, ensuring that only authorized individuals can view, edit, share, or print content. The software integrates with enterprise systems and provides audit trails for compliance requirements. By automating rights management processes, it aims to address business challenges related to information security, data governance, and regulatory compliance, supporting secure collaboration and mitigating risks associated with unauthorized data exposure.
Protect sensitive data flowing in and out of your organization via email. Virtru provides end-to-end encryption, granular access controls, and DLP for Google Gmail and Microsoft Outlook. Virtru’s technology is FedRAMP authorized and FIPS 140-2 validated, providing military-grade security to support compliance with the world’s strictest regulations, including CMMC 2.0, ITAR, CJIS, GLBA, HIPAA, and more.
Virtru’s client-side encryption tools are easy to use, integrating seamlessly with Gmail and Outlook. For recipients, there are no new accounts to create and no software to install.
Virtru gives you control over data even after it’s left your organization: Add advanced controls like an expiration date, watermark, or preventing download — and revoke access at any time. Deploy automated, behind-the-scenes encryption and decryption flows with the server-side Virtru Data Protection Gateway for audit and data assurance.
Trend Micro Endpoint Encryption is a software designed to secure data stored on endpoints such as laptops, desktops, and removable media through encryption and access management. The software helps organizations protect sensitive information by encrypting files, folders, and entire disks, thereby reducing the risk of unauthorized access, data breaches, and loss of confidential data in case of device theft or misplaced storage media. It supports centralized policy management, reporting, and compliance requirements while offering flexible deployment and integration with existing IT infrastructure. This software addresses critical business challenges related to data privacy, regulatory compliance, and information security across distributed workforces.
Dell Data Protection is a software designed to secure and manage data across devices within an organization. The software provides features such as encryption, advanced authentication, and threat prevention to protect sensitive information both at rest and in transit. It enables the enforcement of security policies, management of encryption keys, and compliance with regulatory requirements, addressing business challenges related to data breaches and unauthorized access. Dell Data Protection integrates with endpoint management systems and works with various operating environments, supporting organizations in maintaining data confidentiality, integrity, and availability as part of their information security strategy.
Sophos SafeGuard is a software designed to protect sensitive data through encryption and access control across multiple platforms. It provides full disk, file, and cloud encryption to prevent unauthorized access to confidential information stored on devices and in cloud environments. The software enables organizations to enforce data security policies and ensure compliance with regulatory requirements by automating encryption processes and managing encryption keys centrally. Sophos SafeGuard integrates with endpoint security solutions to facilitate secure data sharing and streamline workflows, helping businesses mitigate risks associated with data loss or theft. It supports various device types, including desktops, laptops, and removable media, and offers reporting capabilities to monitor encryption and compliance status.
SealPath Full Information Protection keeps any file extension secure, under control, and accessible by the right people. Its advanced information protection deploys a layer of security that travels with the data allowing you to control remotely the permissions over the documents (Office, CAD, PDF, etc.). It also offers advanced real-time incident response and monitoring controls, such as, remotely revoking access permissions and detailed reports of who is accessing. With SealPath you will get 24/7 peace of mind, protecting you against data leakage and unauthorized access. SealPath can be deployed in a simplified manner in SaaS or On-Premise and requires minimal time and resource allocation, working seamlessly with systems. SealPath's data protection tool has been designed to provide ease of use and maximize user-friendly interaction. Simplify your information protection journey with SealPath.
Trend Micro Smart Protection Suites is a security software designed to defend endpoints, email, web, and SaaS applications against threats such as malware, ransomware, phishing, and targeted attacks. The software integrates advanced detection techniques including behavioral analysis, application control, and intrusion prevention to protect devices and data across multiple environments. It helps organizations manage vulnerabilities, enforce security policies, and ensure compliance by providing centralized management and automated protection. The software solves business challenges related to information security, minimizing risk from cyber threats and facilitating secure access to critical resources for users operating both within and outside the corporate network.
Sophos Mobile is a software designed to support organizations in managing and securing mobile devices across various platforms, including Android, iOS, and Windows. The software offers features such as mobile device management, mobile application management, and mobile content management. It enables administrators to configure device settings, deploy and manage applications, enforce security policies, and control access to corporate resources. Sophos Mobile addresses business challenges related to data protection, compliance, and cybersecurity by providing mechanisms for remote device locking and wiping, encrypting sensitive information, and detecting threats. The software integrates with existing IT infrastructure and aims to streamline mobility management while mitigating risks associated with mobile endpoints.
Symantec Desktop Email Encryption is a software designed to secure email communications by providing encryption for messages and attachments sent from desktop clients. The software enables users to maintain the confidentiality and integrity of sensitive information shared via email by encrypting content before it leaves the desktop environment. Through the use of public key infrastructure, the software supports recipient authentication and prevents unauthorized access to email data. It streamlines compliance with regulatory standards and helps organizations address risks associated with the transmission of confidential business information. The software integrates with popular email applications and provides options for policy-based encryption, automated key management, and user transparency, thereby supporting protection of data from threats such as eavesdropping and interception.
Symantec Endpoint Encryption is a software designed to protect sensitive data on endpoints through encryption of hard drives and removable media. It offers centralized management for deploying encryption policies, monitoring compliance, and handling recovery processes across devices within an organization. The software supports integration with authentication solutions and allows administrators to enforce data protection protocols to reduce risks associated with data loss or unauthorized access. Symantec Endpoint Encryption addresses the business problem of data security and regulatory compliance by safeguarding information stored on endpoints, even in cases of device theft or loss, while enabling organizations to manage encryption operations efficiently.
Kiteworks is a software designed to facilitate secure file sharing, transfer, and collaboration across organizations. It provides tools for managing sensitive information exchange by enabling users to control, monitor, and audit file activity from a centralized platform. The software offers features such as encryption, role-based access controls, and compliance reporting to help organizations meet regulatory requirements related to information security. Kiteworks integrates with email, file storage, and content management systems to streamline workflows and reduce the risk of data breaches. The software helps address business problems related to data privacy, regulatory compliance, and secure communication.
Symantec File Share Encryption (Legacy) is a software that provides encryption capabilities for protecting sensitive data stored in shared folders and network file shares. The software is designed to enable secure collaboration by allowing authorized users to access encrypted files while preventing unauthorized access. It supports transparent encryption, so files remain protected regardless of their location or transfer method. The software addresses the business need to safeguard confidential information from data breaches and unauthorized disclosure, supporting compliance with data protection regulations. Symantec File Share Encryption integrates with existing authentication infrastructure and offers centralized management for administrators to enforce encryption policies and manage user access rights.
BlackBerry Enterprise Mobility Suite is a software that offers unified endpoint management capabilities, enabling organizations to securely manage and control a wide range of devices, including smartphones, tablets, laptops, and desktops across diverse operating systems. The software provides features such as device and application management, secure file sharing, identity and access management, as well as collaboration tools. It aims to address business needs related to securing corporate data, enforcing compliance policies, and facilitating secure communication among employees. The software also supports mobile threat detection, containerization, and integration with productivity applications, helping organizations manage mobile workflows and protect sensitive information in a variety of enterprise environments.
Dell Endpoint Security Suite Enterprise is a software designed to protect endpoints by integrating threat prevention, encryption, and advanced authentication. The software provides protection against malware and unauthorized access, utilizing behavioral analysis and machine learning to identify potential threats. It includes encryption features to safeguard sensitive data stored on devices and supports management of security policies across distributed environments. The software aims to address business challenges around data security, compliance, and risk management by offering centralized controls for monitoring and responding to security incidents across endpoint devices in an organization.
Microsoft Purview Information Protection is a software that enables organizations to discover, classify, and protect sensitive information across various locations such as emails, documents, and cloud services. The software utilizes data classification, labeling, and encryption to help comply with data privacy regulations and prevent unauthorized access. It provides automated policies for detecting and managing confidential data, and integrates with other Microsoft solutions to support collaboration while safeguarding business information. Through centralized management and auditing capabilities, the software assists businesses in addressing challenges related to the security and governance of data in digital environments.
Symantec Information Centric Encryption is a software designed to protect sensitive data by enabling encryption at the file level both inside and outside of organizational boundaries. The software provides capabilities for persistent data protection, allowing files to remain encrypted regardless of where they travel. It offers policy-driven encryption and access controls, supporting the management of permissions to ensure only authorized individuals can access protected information. This software addresses business challenges related to data security, compliance requirements, and the risks associated with data sharing and collaboration. It integrates with existing workflows, enabling organizations to enforce encryption policies seamlessly and monitor data usage to reduce the likelihood of data breaches or unauthorized disclosures.
DriveLock is a software developed to address endpoint security by providing features such as device control, encryption, application control, and protection against unauthorized data access. The software enables organizations to safeguard sensitive information and manage the use of external devices within a network. It monitors and enforces policies that help prevent data loss and unauthorized software execution, contributing to compliance with regulatory requirements. DriveLock also offers centralized management and reporting capabilities, allowing administrators to oversee security measures across multiple endpoints in diverse environments. The software is designed to support organizational needs related to data protection, risk management, and security posture improvement.
EgoSecure Data Protection is a software solution designed to secure sensitive business data across endpoints within an organization. It offers features including encryption, access control, device management, and data loss prevention to address the challenge of unauthorized data access and leakage. The software enables administrators to define security policies and monitor compliance through centralized management. By integrating automation and analytics, the software helps organizations detect risks and track user activities related to data usage and movement. It supports regulatory requirements by providing reporting and audit capabilities, contributing to the protection of confidential information while maintaining organizational productivity.










