Endpoint Encryption15Endpoint Encryption Software encompasses encryption of disks, folders and files, and also removable media (e.g. flash drives) that may be easily stolen, to prevent data loss and maintain compliance.DigitalPersona1https://dudodiprj2sv7.cloudfront.net/product-logos/qn/HK/XIWFID5ORAT1.JPEGSymantec Endpoint Encryption2https://dudodiprj2sv7.cloudfront.net/product-logos/Hb/7e/RK3T6W25HVGI.PNGBitLocker Drive Encryption3https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGSafeGuard4https://dudodiprj2sv7.cloudfront.net/product-logos/iY/Sa/ZJTTM9TV0UA3.pngMobile Armor5https://dudodiprj2sv7.cloudfront.net/vendor-logos/jO/Qr/06NTU61NMFS5.pngMcAfee Total Protection for Data6https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGSymantec Drive Encryption7https://dudodiprj2sv7.cloudfront.net/vendor-logos/4q/QY/K9TTG2FGRKUZ-180x180.PNGCredant8https://dudodiprj2sv7.cloudfront.net/vendor-logos/QU/Ro/1VKOUZJX2NK3-180x180.PNGDigital Guardian Platform9https://dudodiprj2sv7.cloudfront.net/product-logos/I4/0V/IO0RKKK4QG0I.jpegTrustwave Encryption10https://dudodiprj2sv7.cloudfront.net/product-logos/lf/MQ/UVJDUQ7TI797.jpegPointsec11https://dudodiprj2sv7.cloudfront.net/product-logos/el/42/AVP2KQBCPVTB.jpegCodeproof12https://dudodiprj2sv7.cloudfront.net/product-logos/Gr/7f/8HFTEQG7PT2P.pngEgoSecure EndPoint13https://dudodiprj2sv7.cloudfront.net/product-logos/Tx/Lh/ZJ8O28Z4OZ0N.pngTresorit14https://dudodiprj2sv7.cloudfront.net/product-logos/qc/41/H113F8IBCF7Q.PNGSecureDoc15https://dudodiprj2sv7.cloudfront.net/product-logos/gB/NZ/BOS8NQTA73AW.jpegMicro Focus ZENworks Suite16https://dudodiprj2sv7.cloudfront.net/vendor-logos/Zm/IY/D5DAJSH3LPPI-180x180.GIFSecureFolder17https://dudodiprj2sv7.cloudfront.net/product-logos/HD/qz/ES13P1821NHX.pngEmbassy Trust Suite18https://dudodiprj2sv7.cloudfront.net/product-logos/9O/cx/6AC7357AP128.pngCentrify Endpoint Services19https://dudodiprj2sv7.cloudfront.net/vendor-logos/e9/VT/ZK0AX2SCS5T5-180x180.JPEGPrivilege Manager20https://dudodiprj2sv7.cloudfront.net/vendor-logos/YG/lp/TKJT87HBZIFU-180x180.JPEGF-Secure Protection Service for Business21https://dudodiprj2sv7.cloudfront.net/vendor-logos/4u/3k/1J9AT1MUARJN-180x180.JPEGVormetric Data Security Platform22https://dudodiprj2sv7.cloudfront.net/vendor-logos/Vp/gD/D0ORNQNAOLNC-180x180.JPEGZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption)23https://dudodiprj2sv7.cloudfront.net/vendor-logos/Zm/IY/D5DAJSH3LPPI-180x180.GIFTrustedDisk24https://dudodiprj2sv7.cloudfront.net/vendor-logos/t1/03/GW9B3JVCDZK1-180x180.JPEG

Endpoint Encryption Software

Endpoint Encryption Software Overview

What is Endpoint Encryption Software?

Endpoint Encryption Software protects data residing on a computer hard drive (whether a personal computer or a server) and other network endpoints such as USB flash drives, external hard drives, SD memory cards, etc.

Endpoint encryption can happen in one of two ways. The first is encrypting the files or data on a computer. The advantage of this approach is that each file is encrypted and will remain so if it is moved from the source computer to a different computer. The disadvantage is that each file must be encrypted one by one.

A second approach is often called disk encryption of full disk encryption. With this approach, the entire hard disk drive is encrypted. This approach is particularly helpful in the event of device theft or loss as everything on the hard drive is automatically protected. A possible downside of this approach is that if any file on the encrypted disk is moved to another computer or a flash drive, it is no longer encrypted.

Endpoint Encryption Products

Listings (1-24 of 24)

DigitalPersona

76 Ratings

Crossmatch's DigitalPersona provides a comprehensive multi-factor authentication solution. The vendor’s value proposition is that their solution frees users from cumbersome login activities while making it easy for an IT Team to secure access to their networks, data and applications.

Symantec Endpoint Encryption

18 Ratings

Symantec Endpoint Encryption is unsurprisingly an option for encrypting endpoints from Symantec.

BitLocker Drive Encryption

22 Ratings

Microsoft's BitLocker is an endpoint encryption option.

SafeGuard

8 Ratings

SafeGuard, from UK-based company Sophos, is an endpoint encryption option.

Mobile Armor

3 Ratings

Mobile Armor is a brand of Trend Micro's endpoint encryption and mobile protection software since the 2010 acquisition.

McAfee Total Protection for Data

6 Ratings

McAfee Total Protection for Data is an endpoint encryption option from Intel Security.

Symantec Drive Encryption

2 Ratings

Symantec Drive Encryption is an endpoint encryption option.

Credant

3 Ratings

Credant is an endpoint encryption option, acquired and supported by Dell.

Digital Guardian Platform

1 Ratings

The Digital Guardian Platform from the company company of the same name in Waltham, Massachusetts is an endpoint encryption, mobile data, and data loss protection option (formerly Verdasys).

Trustwave Encryption

1 Ratings

Chicago-based Trustwave offers endpoint encryption.

Pointsec

3 Ratings

Pointsec is an endpoint encryption option from Check Point Software Technologies in California.

Codeproof

We don't have enough ratings and reviews to provide an overall score.

Codeproof Technologies, a Delaware corporation doing business in Redmond, Washington, offers their brand of endpoint encryption and mobile data loss prevention software.

EgoSecure EndPoint

We don't have enough ratings and reviews to provide an overall score.

EgoSecure EndPoint from the German company of the same name is an endpoint encryption option, based on technology acquired from Swiss company Secude (branded FinallySecure).

Tresorit

We don't have enough ratings and reviews to provide an overall score.

Tresorit is an encrypted file sync & sharing solution that uses end-to-end encryption to keep data safe in the cloud, and to help businesses avoid data breaches. Tresorit is specifically designed to share confidential data of business users. Encryption is performed before the data gets...

SecureDoc

We don't have enough ratings and reviews to provide an overall score.

SecureDoc from Canadian company WinMagic is an endpoint encryption option.

Micro Focus ZENworks Suite

We don't have enough ratings and reviews to provide an overall score.

Micro Focus ZENworks Suite is an endpoint encryption option consisting of 7 integrated security products.

SecureFolder

We don't have enough ratings and reviews to provide an overall score.

SecureFolder is an encryption and mobile protection offering from Swiss company Secude.

Embassy Trust Suite

We don't have enough ratings and reviews to provide an overall score.

Embassy Trust Suite from Wave Systems is an endpoint encryption option.

Centrify Endpoint Services

We don't have enough ratings and reviews to provide an overall score.

Centrify’s Endpoint Services are designed to stop breaches that start on endpoints. The vendor aims to help organizations secure their heterogeneous endpoints through a single source of identity and a least privilege access model.According to the vendor key business benefits and features include:...

Privilege Manager

We don't have enough ratings and reviews to provide an overall score.

Privilege Manager from Thycotic in Washington, D.C. is an endpoint protection application emphasizing protection against ransomware and advanced cybersecurity threats and reducing strain on the help desk, with minimal loss of employee time dedicated to privilege and access.

F-Secure Protection Service for Business

We don't have enough ratings and reviews to provide an overall score.

F-Secure offers their Protection Service for Business, the company's endpoint protection and encryption offering.

Vormetric Data Security Platform

We don't have enough ratings and reviews to provide an overall score.

Vormetric Data Security Platform includes multiple data security products that deliver advanced encryption, tokenization and centralized key management.

ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption)

We don't have enough ratings and reviews to provide an overall score.

Micro Focus offers ZENworks Full Disk Encryption (formerly a Novell product before that company's acquisition by Micro Focus), a solution to encrypt desktops and laptops, and also manage encrypted devices in a centralized fashion from a single console. The application is available on its own as...

TrustedDisk

We don't have enough ratings and reviews to provide an overall score.

German company Rohde & Schwarz offers TrustedDisk, a compliant endpoint encryption solution for enterprises.