• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Mobile Data Protection (MDP) Solutions Reviews and Ratings

What are Mobile Data Protection (MDP) Solutions?

Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Harmony Mobile
Harmony Mobile
Logo of Check Point Full Disk Encryption Software
Check Point Full Disk Encryption Software
Logo of Trellix Mobile Security
Trellix Mobile Security
For 50M-1B USD Companies
Logo of Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption
Logo of Check Point Full Disk Encryption Software
Check Point Full Disk Encryption Software
Logo of Harmony Mobile
Harmony Mobile
For Asia/Pacific
Logo of Check Point Full Disk Encryption Software
Check Point Full Disk Encryption Software
Logo of Harmony Mobile
Harmony Mobile
Logo of Harmony Endpoint
Harmony Endpoint
Integration & Deployment
Logo of Symantec Drive Encryption
Symantec Drive Encryption
Logo of Microsoft BitLocker
Microsoft BitLocker
Logo of Harmony Mobile
Harmony Mobile

Product Listings

Filter by

Products 1 - 20 of 20
Sort by
Logo of Harmony Mobile

Harmony Mobile

By Check Point Software Technologies

4.6
(105 Ratings)

Harmony Mobile is a software developed by Check Point that provides threat prevention and security for mobile devices within an organization. The software offers protection against malware, phishing, and network attacks aimed at mobile endpoints. Harmony Mobile monitors device activity and evaluates applications to detect malicious behaviors and safeguard sensitive business data. The software facilitates compliance with corporate security policies and integrates with existing mobile device management solutions to streamline administration. By identifying and mitigating security risks on mobile devices, Harmony Mobile addresses business concerns related to unauthorized data access and potential cyber threats, helping organizations maintain secure mobile operations.

Show More Details
Logo of Check Point Full Disk Encryption Software

Check Point Full Disk Encryption Software

By Check Point Software Technologies

4.7
(93 Ratings)

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Show More Details
Logo of Microsoft BitLocker

Microsoft BitLocker

By Microsoft

4.3
(72 Ratings)

Microsoft BitLocker is a disk encryption software designed to protect data by providing encryption for entire volumes. The software integrates with operating systems to help prevent unauthorized access to data stored on the system, even if the device is lost or stolen. BitLocker uses advanced encryption algorithms and can leverage hardware-based security features such as Trusted Platform Module. It supports management and recovery options for enterprise environments and helps address compliance requirements for data protection. The software is suitable for organizations seeking to safeguard sensitive information against potential threats related to physical device theft or unauthorized data exposure.

Show More Details
Logo of Harmony Endpoint

Harmony Endpoint

By Check Point Software Technologies

4.5
(71 Ratings)

Harmony Endpoint is a software designed to protect endpoints from cyber threats, including malware, ransomware, phishing, and other forms of attacks. The software provides endpoint detection and response capabilities, enabling organizations to identify, investigate, and remediate threats on user devices. It integrates automated threat prevention technologies and behavioral analysis to detect and block suspicious activities. The software supports centralized management and reporting, allowing administrators to configure security policies and monitor endpoint security status. By addressing vulnerabilities across desktops, laptops, and remote devices, Harmony Endpoint helps organizations reduce the risk of data breaches and maintain compliance with security standards.

Show More Details
Logo of Trend Micro Endpoint Encryption

Trend Micro Endpoint Encryption

By Trend Micro

4.6
(25 Ratings)

Trend Micro Endpoint Encryption is a software designed to secure data stored on endpoints such as laptops, desktops, and removable media through encryption and access management. The software helps organizations protect sensitive information by encrypting files, folders, and entire disks, thereby reducing the risk of unauthorized access, data breaches, and loss of confidential data in case of device theft or misplaced storage media. It supports centralized policy management, reporting, and compliance requirements while offering flexible deployment and integration with existing IT infrastructure. This software addresses critical business challenges related to data privacy, regulatory compliance, and information security across distributed workforces.

Show More Details
Logo of Trellix Mobile Security

Trellix Mobile Security

By Trellix

4.9
(23 Ratings)

Trellix Mobile Security is a software designed to safeguard mobile devices against threats by providing protection against malware, network attacks, and unauthorized access. The software offers features such as real-time threat detection, device compliance monitoring, and application security management. It supports integration with enterprise security frameworks, allowing organizations to enforce security policies and respond to mobile threats. Trellix Mobile Security addresses the need for secure mobile environments in businesses, helping to mitigate risks related to data breaches and unauthorized data exposure while supporting secure connectivity and access to corporate resources.

Show More Details
Logo of Check Point Capsule (Legacy)

Check Point Capsule (Legacy)

By Check Point Software Technologies

4.1
(20 Ratings)

Check Point Capsule is a software designed to provide secure access, protection, and management of mobile devices and data for organizations. The software enables encryption, sandboxing, and threat prevention functionalities to safeguard business communications and corporate data across devices and cloud applications. By managing mobile security policies and enabling secure containers for corporate information, the software addresses business challenges related to data leakage, unauthorized access, and mobile threats. Check Point Capsule is structured to support the enforcement of compliance requirements while facilitating secure collaboration and connectivity for end users working from various locations and devices.

Show More Details
Logo of Dell Data Protection

Dell Data Protection

By Dell Technologies

4.8
(20 Ratings)

Dell Data Protection is a software designed to secure and manage data across devices within an organization. The software provides features such as encryption, advanced authentication, and threat prevention to protect sensitive information both at rest and in transit. It enables the enforcement of security policies, management of encryption keys, and compliance with regulatory requirements, addressing business challenges related to data breaches and unauthorized access. Dell Data Protection integrates with endpoint management systems and works with various operating environments, supporting organizations in maintaining data confidentiality, integrity, and availability as part of their information security strategy.

Show More Details
Logo of Sophos SafeGuard

Sophos SafeGuard

By Sophos

4
(17 Ratings)

Sophos SafeGuard is a software designed to protect sensitive data through encryption and access control across multiple platforms. It provides full disk, file, and cloud encryption to prevent unauthorized access to confidential information stored on devices and in cloud environments. The software enables organizations to enforce data security policies and ensure compliance with regulatory requirements by automating encryption processes and managing encryption keys centrally. Sophos SafeGuard integrates with endpoint security solutions to facilitate secure data sharing and streamline workflows, helping businesses mitigate risks associated with data loss or theft. It supports various device types, including desktops, laptops, and removable media, and offers reporting capabilities to monitor encryption and compliance status.

Show More Details
Logo of Symantec Drive Encryption

Symantec Drive Encryption

By Broadcom

4.3
(16 Ratings)

Symantec Drive Encryption is a software that provides data protection through full disk encryption for endpoints. It encrypts the entire hard drive on desktops and laptops, ensuring that data remains protected against unauthorized access if a device is lost or stolen. The software supports single sign-on, centralized management, and policy enforcement to streamline deployment and administration. It integrates with authentication methods such as passwords and smart cards, enabling compliance with data protection regulations. Symantec Drive Encryption is designed to address business needs for securing sensitive information and supporting regulatory requirements for data privacy by preventing unauthorized data exposure.

Show More Details
Logo of Sophos Endpoint Protection (Legacy)

Sophos Endpoint Protection (Legacy)

By Sophos

4.4
(13 Ratings)

Sophos Endpoint Protection (Legacy) is a software designed to secure devices and endpoints from malware, ransomware, and other cyber threats. The software includes features such as antivirus, web filtering, application control, device control, and host-based intrusion prevention to help protect business environments. It provides real-time protection by scanning files, websites, and applications for potential risks, and enables administrators to manage security policies across multiple devices. The software aims to address the challenge of managing threats to endpoints within organizations by centralizing security controls and reporting, offering a method for organizations to protect sensitive data and maintain regulatory compliance.

Show More Details
Logo of Fortra DLP

Fortra DLP

By Fortra

3.3
(11 Ratings)

Fortra DLP gives you immediate visibility into your organization’s critical assets, protecting data and IP wherever it lives. Fortra makes it easier to see, understand, and block threats to your sensitive information. Available as a Software-as-a-Service or managed service deployment, our pre-built dashboards and compliance policies help you get started faster, so you can see results and mitigate risk quickly. Fortra’s deep visibility and ability to work with existing data classification tools give you greater deployed efficacy without compromising on the flexibility you need to match your enterprise needs.

Show More Details
Logo of Symantec Endpoint Encryption (SEE)

Symantec Endpoint Encryption (SEE)

By Broadcom

4.1
(11 Ratings)

Symantec Endpoint Encryption is a software designed to protect sensitive data on endpoints through encryption of hard drives and removable media. It offers centralized management for deploying encryption policies, monitoring compliance, and handling recovery processes across devices within an organization. The software supports integration with authentication solutions and allows administrators to enforce data protection protocols to reduce risks associated with data loss or unauthorized access. Symantec Endpoint Encryption addresses the business problem of data security and regulatory compliance by safeguarding information stored on endpoints, even in cases of device theft or loss, while enabling organizations to manage encryption operations efficiently.

Show More Details
Logo of Dell Endpoint Security Suite Enterprise

Dell Endpoint Security Suite Enterprise

By Dell Technologies

4.8
(3 Ratings)

Dell Endpoint Security Suite Enterprise is a software designed to protect endpoints by integrating threat prevention, encryption, and advanced authentication. The software provides protection against malware and unauthorized access, utilizing behavioral analysis and machine learning to identify potential threats. It includes encryption features to safeguard sensitive data stored on devices and supports management of security policies across distributed environments. The software aims to address business challenges around data security, compliance, and risk management by offering centralized controls for monitoring and responding to security incidents across endpoint devices in an organization.

Show More Details
Logo of DriveStrike

DriveStrike

By Spearstone

4.3
(3 Ratings)

DriveStrike is a software designed to provide data protection and device management for organizations. The software enables administrators to remotely secure, track, and manage devices such as computers, smartphones, and tablets. Its features include remote wipe, lock, and locate functionalities intended to safeguard sensitive information in the event of device loss, theft, or unauthorized access. DriveStrike supports multiple operating systems and is used to help organizations maintain data security compliance, mitigate risks associated with mobile and remote workforces, and respond to incidents effectively. The software focuses on minimizing data breach risks by providing centralized management of endpoint security and device control.

Show More Details
Logo of SEE Removable Storage Edition

SEE Removable Storage Edition

By Broadcom

3
(1 Rating)

SEE Removable Storage Edition is software designed to manage and protect data transferred to and from removable storage devices within an organization. The software provides encryption capabilities for data storage and ensures that only authorized users can access information on removable media. It supports centralized management of storage policies, enabling security teams to monitor and control data movement effectively. The software assists businesses in reducing the risk of data loss or unauthorized access through removable media while maintaining compliance with corporate security standards and regulatory requirements. It integrates with existing IT infrastructure to automate policy enforcement and reporting related to removable storage operations.

Show More Details
Logo of DriveLock

DriveLock

By Center Tools

DriveLock is a software developed to address endpoint security by providing features such as device control, encryption, application control, and protection against unauthorized data access. The software enables organizations to safeguard sensitive information and manage the use of external devices within a network. It monitors and enforces policies that help prevent data loss and unauthorized software execution, contributing to compliance with regulatory requirements. DriveLock also offers centralized management and reporting capabilities, allowing administrators to oversee security measures across multiple endpoints in diverse environments. The software is designed to support organizational needs related to data protection, risk management, and security posture improvement.

Be the first to .
Logo of EgoSecure Data Protection

EgoSecure Data Protection

By EgoSecure

EgoSecure Data Protection is a software solution designed to secure sensitive business data across endpoints within an organization. It offers features including encryption, access control, device management, and data loss prevention to address the challenge of unauthorized data access and leakage. The software enables administrators to define security policies and monitor compliance through centralized management. By integrating automation and analytics, the software helps organizations detect risks and track user activities related to data usage and movement. It supports regulatory requirements by providing reporting and audit capabilities, contributing to the protection of confidential information while maintaining organizational productivity.

Be the first to .
Logo of MobSec

MobSec

By Data Resolve

MobSec is a software developed by Data Resolve that focuses on mobile device security management for organizations. The software provides features for device monitoring, data protection, and compliance enforcement on mobile platforms. It addresses the business problem of securing sensitive data accessed or stored on mobile devices used by employees, aiming to minimize risks such as unauthorized access, data leakage, and non-compliance with regulatory standards. MobSec supports policy enforcement, real-time alerts, and reporting to assist organizations in managing and monitoring mobile endpoints while maintaining control over corporate information in distributed environments.

Be the first to .
Logo of WipeMobile

WipeMobile

By YouWipe

WipeMobile is a software designed to securely erase data from mobile devices, including smartphones and tablets, to help organizations manage data protection and comply with data privacy regulations. The software supports a range of device platforms and automates the deletion process to ensure that sensitive information is permanently removed. WipeMobile offers features such as remote erasure, bulk processing, and detailed reporting to facilitate asset lifecycle management and device decommissioning. The software also generates certificates of data erasure, providing auditable documentation for regulatory compliance and internal record-keeping. Its functionality addresses business requirements for secure data removal and risk mitigation in the context of mobile device management.

Be the first to .

Gartner Research

Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Popular Product Comparisons

Harmony Endpoint vs Microsoft BitLockerMicrosoft BitLocker vs Symantec Drive EncryptionMicrosoft BitLocker vs Trend Micro Endpoint EncryptionDell Data Protection vs Microsoft BitLockerMicrosoft BitLocker vs Sophos SafeGuardMicrosoft BitLocker vs Symantec Endpoint Encryption (SEE)Check Point Full Disk Encryption Software vs Microsoft BitLocker

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.