Mobile Data Protection (MDP) Solutions Reviews and Ratings
What are Mobile Data Protection (MDP) Solutions?
Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.
Product Listings
Filter by
Harmony Mobile is a software developed by Check Point that provides threat prevention and security for mobile devices within an organization. The software offers protection against malware, phishing, and network attacks aimed at mobile endpoints. Harmony Mobile monitors device activity and evaluates applications to detect malicious behaviors and safeguard sensitive business data. The software facilitates compliance with corporate security policies and integrates with existing mobile device management solutions to streamline administration. By identifying and mitigating security risks on mobile devices, Harmony Mobile addresses business concerns related to unauthorized data access and potential cyber threats, helping organizations maintain secure mobile operations.
Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.
Microsoft BitLocker is a disk encryption software designed to protect data by providing encryption for entire volumes. The software integrates with operating systems to help prevent unauthorized access to data stored on the system, even if the device is lost or stolen. BitLocker uses advanced encryption algorithms and can leverage hardware-based security features such as Trusted Platform Module. It supports management and recovery options for enterprise environments and helps address compliance requirements for data protection. The software is suitable for organizations seeking to safeguard sensitive information against potential threats related to physical device theft or unauthorized data exposure.
Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.
Trend Micro Endpoint Encryption is a software designed to secure data stored on endpoints such as laptops, desktops, and removable media through encryption and access management. The software helps organizations protect sensitive information by encrypting files, folders, and entire disks, thereby reducing the risk of unauthorized access, data breaches, and loss of confidential data in case of device theft or misplaced storage media. It supports centralized policy management, reporting, and compliance requirements while offering flexible deployment and integration with existing IT infrastructure. This software addresses critical business challenges related to data privacy, regulatory compliance, and information security across distributed workforces.
Trellix Mobile Security is a software designed to safeguard mobile devices against threats by providing protection against malware, network attacks, and unauthorized access. The software offers features such as real-time threat detection, device compliance monitoring, and application security management. It supports integration with enterprise security frameworks, allowing organizations to enforce security policies and respond to mobile threats. Trellix Mobile Security addresses the need for secure mobile environments in businesses, helping to mitigate risks related to data breaches and unauthorized data exposure while supporting secure connectivity and access to corporate resources.
Check Point Capsule is a software designed to provide secure access, protection, and management of mobile devices and data for organizations. The software enables encryption, sandboxing, and threat prevention functionalities to safeguard business communications and corporate data across devices and cloud applications. By managing mobile security policies and enabling secure containers for corporate information, the software addresses business challenges related to data leakage, unauthorized access, and mobile threats. Check Point Capsule is structured to support the enforcement of compliance requirements while facilitating secure collaboration and connectivity for end users working from various locations and devices.
Dell Data Protection is a software designed to secure and manage data across devices within an organization. The software provides features such as encryption, advanced authentication, and threat prevention to protect sensitive information both at rest and in transit. It enables the enforcement of security policies, management of encryption keys, and compliance with regulatory requirements, addressing business challenges related to data breaches and unauthorized access. Dell Data Protection integrates with endpoint management systems and works with various operating environments, supporting organizations in maintaining data confidentiality, integrity, and availability as part of their information security strategy.
Sophos SafeGuard is a software designed to protect sensitive data through encryption and access control across multiple platforms. It provides full disk, file, and cloud encryption to prevent unauthorized access to confidential information stored on devices and in cloud environments. The software enables organizations to enforce data security policies and ensure compliance with regulatory requirements by automating encryption processes and managing encryption keys centrally. Sophos SafeGuard integrates with endpoint security solutions to facilitate secure data sharing and streamline workflows, helping businesses mitigate risks associated with data loss or theft. It supports various device types, including desktops, laptops, and removable media, and offers reporting capabilities to monitor encryption and compliance status.
Symantec Drive Encryption is a software that provides data protection through full disk encryption for endpoints. It encrypts the entire hard drive on desktops and laptops, ensuring that data remains protected against unauthorized access if a device is lost or stolen. The software supports single sign-on, centralized management, and policy enforcement to streamline deployment and administration. It integrates with authentication methods such as passwords and smart cards, enabling compliance with data protection regulations. Symantec Drive Encryption is designed to address business needs for securing sensitive information and supporting regulatory requirements for data privacy by preventing unauthorized data exposure.
Sophos Endpoint Protection (Legacy) is a software designed to secure devices and endpoints from malware, ransomware, and other cyber threats. The software includes features such as antivirus, web filtering, application control, device control, and host-based intrusion prevention to help protect business environments. It provides real-time protection by scanning files, websites, and applications for potential risks, and enables administrators to manage security policies across multiple devices. The software aims to address the challenge of managing threats to endpoints within organizations by centralizing security controls and reporting, offering a method for organizations to protect sensitive data and maintain regulatory compliance.
Fortra DLP gives you immediate visibility into your organization’s critical assets, protecting data and IP wherever it lives. Fortra makes it easier to see, understand, and block threats to your sensitive information. Available as a Software-as-a-Service or managed service deployment, our pre-built dashboards and compliance policies help you get started faster, so you can see results and mitigate risk quickly. Fortra’s deep visibility and ability to work with existing data classification tools give you greater deployed efficacy without compromising on the flexibility you need to match your enterprise needs.
Symantec Endpoint Encryption is a software designed to protect sensitive data on endpoints through encryption of hard drives and removable media. It offers centralized management for deploying encryption policies, monitoring compliance, and handling recovery processes across devices within an organization. The software supports integration with authentication solutions and allows administrators to enforce data protection protocols to reduce risks associated with data loss or unauthorized access. Symantec Endpoint Encryption addresses the business problem of data security and regulatory compliance by safeguarding information stored on endpoints, even in cases of device theft or loss, while enabling organizations to manage encryption operations efficiently.
Dell Endpoint Security Suite Enterprise is a software designed to protect endpoints by integrating threat prevention, encryption, and advanced authentication. The software provides protection against malware and unauthorized access, utilizing behavioral analysis and machine learning to identify potential threats. It includes encryption features to safeguard sensitive data stored on devices and supports management of security policies across distributed environments. The software aims to address business challenges around data security, compliance, and risk management by offering centralized controls for monitoring and responding to security incidents across endpoint devices in an organization.
DriveStrike is a software designed to provide data protection and device management for organizations. The software enables administrators to remotely secure, track, and manage devices such as computers, smartphones, and tablets. Its features include remote wipe, lock, and locate functionalities intended to safeguard sensitive information in the event of device loss, theft, or unauthorized access. DriveStrike supports multiple operating systems and is used to help organizations maintain data security compliance, mitigate risks associated with mobile and remote workforces, and respond to incidents effectively. The software focuses on minimizing data breach risks by providing centralized management of endpoint security and device control.
SEE Removable Storage Edition is software designed to manage and protect data transferred to and from removable storage devices within an organization. The software provides encryption capabilities for data storage and ensures that only authorized users can access information on removable media. It supports centralized management of storage policies, enabling security teams to monitor and control data movement effectively. The software assists businesses in reducing the risk of data loss or unauthorized access through removable media while maintaining compliance with corporate security standards and regulatory requirements. It integrates with existing IT infrastructure to automate policy enforcement and reporting related to removable storage operations.
DriveLock is a software developed to address endpoint security by providing features such as device control, encryption, application control, and protection against unauthorized data access. The software enables organizations to safeguard sensitive information and manage the use of external devices within a network. It monitors and enforces policies that help prevent data loss and unauthorized software execution, contributing to compliance with regulatory requirements. DriveLock also offers centralized management and reporting capabilities, allowing administrators to oversee security measures across multiple endpoints in diverse environments. The software is designed to support organizational needs related to data protection, risk management, and security posture improvement.
EgoSecure Data Protection is a software solution designed to secure sensitive business data across endpoints within an organization. It offers features including encryption, access control, device management, and data loss prevention to address the challenge of unauthorized data access and leakage. The software enables administrators to define security policies and monitor compliance through centralized management. By integrating automation and analytics, the software helps organizations detect risks and track user activities related to data usage and movement. It supports regulatory requirements by providing reporting and audit capabilities, contributing to the protection of confidential information while maintaining organizational productivity.
MobSec is a software developed by Data Resolve that focuses on mobile device security management for organizations. The software provides features for device monitoring, data protection, and compliance enforcement on mobile platforms. It addresses the business problem of securing sensitive data accessed or stored on mobile devices used by employees, aiming to minimize risks such as unauthorized access, data leakage, and non-compliance with regulatory standards. MobSec supports policy enforcement, real-time alerts, and reporting to assist organizations in managing and monitoring mobile endpoints while maintaining control over corporate information in distributed environments.
WipeMobile is a software designed to securely erase data from mobile devices, including smartphones and tablets, to help organizations manage data protection and comply with data privacy regulations. The software supports a range of device platforms and automates the deletion process to ensure that sensitive information is permanently removed. WipeMobile offers features such as remote erasure, bulk processing, and detailed reporting to facilitate asset lifecycle management and device decommissioning. The software also generates certificates of data erasure, providing auditable documentation for regulatory compliance and internal record-keeping. Its functionality addresses business requirements for secure data removal and risk mitigation in the context of mobile device management.











