Information-Centric Endpoint and Mobile Protection Reviews and Ratings

What is Information-Centric Endpoint and Mobile Protection?

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.

Products In Information-Centric Endpoint and Mobile Protection Market

"Security is #1 and we trust Bitlocker"

Overall we use and trust this product to protect our devices. Bitlocker is fairly simple to implement and use from an IT standpoint, and since it's a Microsoft product it's very easy to integrate and rollout. Support is always good for this as well

Read reviews

"Examining WinMagic SecureDoc: The Pros and Cons Revealed"

During the course of time we used WinMagic SecureDoc, we had a very few issues that had to be addressed by the support

Read reviews

"Securing Sensitive Data with Seclore: A Seamless Experience"

Using Seclore Rights management has been transformative for our organization. it ensures our sensitive data is secure, even when shared externally. The platform is user-friendly and integrates seamlessly with our existing systems. we have peace of mind knowing our information in protecting enhancing both security and productivity. highly recommended

Read reviews

"Trend Micro Endpoint Encryption - An additional protection to Endpoints"

Trend Micro Endpoint encryption provides security in endpoints especially when the users brings their units at home. This simply enhances the data loss protection of one's unit

Read reviews

"Sophos SafeGuard: Protecting your Data"

Since we implemented Sophos SafeGuard, we have the assurance that our information traffic is secure and protected. This provides us with peace of mind and calm.

Read reviews

"Virtru Continues to Outpace the Competition in K-12 Education"

It is not often that we encounter a mandatory requirement and acquire a solution that far-exceeds our original needs. This was the case with Virtru and their solutions for data encryption and security. What began with a limited number of (90) user licenses -- just enough to cover our critical users (Special Ed and School Nurses) and their email correspondence with parents -- grew very quickly. Within days, when other users recognized the value of Virtru (school registrars and secretaries handling enrollment files, applications, and student transcripts) we doubled our Virtru user base and licenses. As word continued to spread, multiple requests per week were made by other user groups to gain access to Virtru. After we tripled our original number of licenses (with more users asking for Virtru), we made the decision to move to a full domain (organization) license. This made it possible for 1800 users -- all employees -- to have access to the benefits of Virtru. This upgrade to unlimited licenses turned out to be a more cost-effective approach than it was to manage individual licenses. With a variation of user needs (from email encryption to the sharing of secure files), Virtru provided us with the flexibility to extend these capabilities to our employees.

Read reviews

"Advanced Protection Solutions"

It helps to protect the data. Also enable users to work as per their convenience on any device. It helps to protect system disks. Also useful for remote management.

Read reviews

"Trend Micro Smart Protection Review"

The experience with Trend Micro smart protection is very good. The product offers many features in a single suite.

Read reviews

"Robust Security and Easy Management: Sophos Mobile Delivers."

Sophos Mobile offers an intuitive interface and robust security features, making it an efficient and reliable solution for mobile device management.

Read reviews

"Provides Secure E-mail communication with using PKI Infastructure"

We have implemented this application to communicate securely with another company. Installation is very easy. After installing the application, public and private keys will be created to use secure communication. Symantec Encryption Desktop application can be able to encrypt your email or attachments. However, all users who will communicate securely with each other must have this application on their computer. And also they should share their Public keys. Data will not be accessible if we lost the keys. So keys backup is very important.

Read reviews

"Best in industry and has all necessary features with good support."

Easy to manage all machines with single dashboard. Server requirements are minimum. Can be implemented from cloud as well as from on premise. Works on Mac as well as on Windows. It is costly as compare to Mcafee.

Read reviews

"Very good solution"

Efficient software, good recommendations.We opted for this solution to encrypt and protect sensitive documents, and we are very pleased with the choice.

Read reviews

"Great way to send files securely."

My favorite part about kiteworks is powerful Office 365 integration. I can use my favorite applications to create documents with a high level of security. Kiteworks works great.

Read reviews
Competitors and Alternatives
Kiteworks vs MicrosoftSee All Alternatives

"Protect your critical file types with PGP Client"

File Share Encryption is very good solution to encrypt business critical files on the end users machines. We have defined some file type extension to encrypt automatically on the client Machines and unauthorized users cannot access this encrypted files without correct keys. There is no any noticable latency while accessing to encrypted files by the PGP Client.

Read reviews

"Comfort"

Blackberry enterprise mobility suite provides unique and innovative solutions to the most important aspects and to customers with the best customer service quality. The best way to get competitive and affordable with the client and easily reachable to them

Read reviews

"Securing Physical and Virtual Endpoint Devices and the Data On Them was Seemless!"

Working with Dell directly was a great experience. They have done Endpoint Security forever and the planning, deployment and follow-up was a breeze. The 3rd party vendor we used (not named here) was not the best but Dell intervened and everything came out fine in the end.

Read reviews

"Encrypting files sent outside the organization. "

In our organization, Symantec Information Centric Encryption allows us to secure confidential information sent outside our organization. User and administrator interface are very easy to use. The system works very well and integrates with Symantec DLP.

Read reviews
Products 1 - 18