• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

What are Mobile Data Protection (MDP) Solutions?

Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Harmony Mobile
Harmony Mobile
Logo of Harmony Endpoint
Harmony Endpoint
Logo of Fortra DLP
Fortra DLP
For 50M-1B USD Companies
Logo of Harmony Mobile
Harmony Mobile
Logo of Harmony Endpoint
Harmony Endpoint
For Asia/Pacific
Logo of Harmony Mobile
Harmony Mobile
Logo of Harmony Endpoint
Harmony Endpoint
Integration & Deployment
Logo of Harmony Mobile
Harmony Mobile
Logo of Harmony Endpoint
Harmony Endpoint
Logo of Fortra DLP
Fortra DLP
All Categories
/
Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Mobile Data Protection (MDP) Solutions Reviews and Ratings

Best Mobile Data Protection Solutions Reviews 2026 | Gartner Peer Insights

Gartner Client Insights

Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Product Listings

Filter by

Products 1 - 14 of 14
Sort by
Logo of Harmony Mobile

Harmony Mobile

By Check Point Software Technologies

4.6
(105 Ratings)

Harmony Mobile is a software developed by Check Point that provides threat prevention and security for mobile devices within an organization. The software offers protection against malware, phishing, and network attacks aimed at mobile endpoints. Harmony Mobile monitors device activity and evaluates applications to detect malicious behaviors and safeguard sensitive business data. The software facilitates compliance with corporate security policies and integrates with existing mobile device management solutions to streamline administration. By identifying and mitigating security risks on mobile devices, Harmony Mobile addresses business concerns related to unauthorized data access and potential cyber threats, helping organizations maintain secure mobile operations.

Show More Details
Logo of Check Point Full Disk Encryption Software (Legacy)

Check Point Full Disk Encryption Software (Legacy)

By Check Point Software Technologies

4.7
(93 Ratings)

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.5
(71 Ratings)

Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.

Show More Details
Logo of Trend Micro Endpoint Encryption (Legacy)

Trend Micro Endpoint Encryption (Legacy)

By Trend Micro

4.6
(25 Ratings)

Trend Micro Endpoint Encryption is a software designed to secure data stored on endpoints such as laptops, desktops, and removable media through encryption and access management. The software helps organizations protect sensitive information by encrypting files, folders, and entire disks, thereby reducing the risk of unauthorized access, data breaches, and loss of confidential data in case of device theft or misplaced storage media. It supports centralized policy management, reporting, and compliance requirements while offering flexible deployment and integration with existing IT infrastructure. This software addresses critical business challenges related to data privacy, regulatory compliance, and information security across distributed workforces.

Show More Details
Logo of Check Point Capsule (Legacy)

Check Point Capsule (Legacy)

By Check Point Software Technologies

4.2
(20 Ratings)

Check Point Capsule is a software designed to provide secure access, protection, and management of mobile devices and data for organizations. The software enables encryption, sandboxing, and threat prevention functionalities to safeguard business communications and corporate data across devices and cloud applications. By managing mobile security policies and enabling secure containers for corporate information, the software addresses business challenges related to data leakage, unauthorized access, and mobile threats. Check Point Capsule is structured to support the enforcement of compliance requirements while facilitating secure collaboration and connectivity for end users working from various locations and devices.

Show More Details
Logo of Dell Data Protection (Legacy)

Dell Data Protection (Legacy)

By Dell Technologies

4.8
(20 Ratings)

Dell Data Protection is a software designed to secure and manage data across devices within an organization. The software provides features such as encryption, advanced authentication, and threat prevention to protect sensitive information both at rest and in transit. It enables the enforcement of security policies, management of encryption keys, and compliance with regulatory requirements, addressing business challenges related to data breaches and unauthorized access. Dell Data Protection integrates with endpoint management systems and works with various operating environments, supporting organizations in maintaining data confidentiality, integrity, and availability as part of their information security strategy.

Show More Details
Logo of Sophos SafeGuard (Legacy)

Sophos SafeGuard (Legacy)

By Sophos

4
(17 Ratings)

Sophos SafeGuard is a software designed to protect sensitive data through encryption and access control across multiple platforms. It provides full disk, file, and cloud encryption to prevent unauthorized access to confidential information stored on devices and in cloud environments. The software enables organizations to enforce data security policies and ensure compliance with regulatory requirements by automating encryption processes and managing encryption keys centrally. Sophos SafeGuard integrates with endpoint security solutions to facilitate secure data sharing and streamline workflows, helping businesses mitigate risks associated with data loss or theft. It supports various device types, including desktops, laptops, and removable media, and offers reporting capabilities to monitor encryption and compliance status.

Show More Details
Logo of Symantec Drive Encryption (Legacy)

Symantec Drive Encryption (Legacy)

By Broadcom

4.4
(16 Ratings)

Symantec Drive Encryption is a software that provides data protection through full disk encryption for endpoints. It encrypts the entire hard drive on desktops and laptops, ensuring that data remains protected against unauthorized access if a device is lost or stolen. The software supports single sign-on, centralized management, and policy enforcement to streamline deployment and administration. It integrates with authentication methods such as passwords and smart cards, enabling compliance with data protection regulations. Symantec Drive Encryption is designed to address business needs for securing sensitive information and supporting regulatory requirements for data privacy by preventing unauthorized data exposure.

Show More Details
Logo of Sophos Endpoint Protection (Legacy)

Sophos Endpoint Protection (Legacy)

By Sophos

4.3
(13 Ratings)

Sophos Endpoint Protection (Legacy) is a software designed to secure devices and endpoints from malware, ransomware, and other cyber threats. The software includes features such as antivirus, web filtering, application control, device control, and host-based intrusion prevention to help protect business environments. It provides real-time protection by scanning files, websites, and applications for potential risks, and enables administrators to manage security policies across multiple devices. The software aims to address the challenge of managing threats to endpoints within organizations by centralizing security controls and reporting, offering a method for organizations to protect sensitive data and maintain regulatory compliance.

Show More Details
Logo of Fortra DLP

Fortra DLP

By Fortra

3.3
(11 Ratings)

Fortra DLP gives you immediate visibility into your organization’s critical assets, protecting data and IP wherever it lives. Fortra makes it easier to see, understand, and block threats to your sensitive information. Available as a Software-as-a-Service or managed service deployment, our pre-built dashboards and compliance policies help you get started faster, so you can see results and mitigate risk quickly. Fortra’s deep visibility and ability to work with existing data classification tools give you greater deployed efficacy without compromising on the flexibility you need to match your enterprise needs.

Show More Details
Logo of Dell Endpoint Security Suite Enterprise (Legacy)

Dell Endpoint Security Suite Enterprise (Legacy)

By Dell Technologies

4.8
(3 Ratings)

Dell Endpoint Security Suite Enterprise is a software designed to protect endpoints by integrating threat prevention, encryption, and advanced authentication. The software provides protection against malware and unauthorized access, utilizing behavioral analysis and machine learning to identify potential threats. It includes encryption features to safeguard sensitive data stored on devices and supports management of security policies across distributed environments. The software aims to address business challenges around data security, compliance, and risk management by offering centralized controls for monitoring and responding to security incidents across endpoint devices in an organization.

Show More Details
Logo of SEE Removable Storage Edition (Legacy)

SEE Removable Storage Edition (Legacy)

By Broadcom

3
(1 Rating)

SEE Removable Storage Edition is software designed to manage and protect data transferred to and from removable storage devices within an organization. The software provides encryption capabilities for data storage and ensures that only authorized users can access information on removable media. It supports centralized management of storage policies, enabling security teams to monitor and control data movement effectively. The software assists businesses in reducing the risk of data loss or unauthorized access through removable media while maintaining compliance with corporate security standards and regulatory requirements. It integrates with existing IT infrastructure to automate policy enforcement and reporting related to removable storage operations.

Show More Details
Logo of Matrix42 Endpoint Data Protection

Matrix42 Endpoint Data Protection

By Matrix42

EgoSecure Data Protection is a software solution designed to secure sensitive business data across endpoints within an organization. It offers features including encryption, access control, device management, and data loss prevention to address the challenge of unauthorized data access and leakage. The software enables administrators to define security policies and monitor compliance through centralized management. By integrating automation and analytics, the software helps organizations detect risks and track user activities related to data usage and movement. It supports regulatory requirements by providing reporting and audit capabilities, contributing to the protection of confidential information while maintaining organizational productivity.

Be the first to .
Logo of WipeMobile (Legacy)

WipeMobile (Legacy)

By YouWipe

WipeMobile is a software designed to securely erase data from mobile devices, including smartphones and tablets, to help organizations manage data protection and comply with data privacy regulations. The software supports a range of device platforms and automates the deletion process to ensure that sensitive information is permanently removed. WipeMobile offers features such as remote erasure, bulk processing, and detailed reporting to facilitate asset lifecycle management and device decommissioning. The software also generates certificates of data erasure, providing auditable documentation for regulatory compliance and internal record-keeping. Its functionality addresses business requirements for secure data removal and risk mitigation in the context of mobile device management.