Endpoint Encryption15Endpoint Encryption Software encompasses encryption of disks, folders and files, and also removable media (e.g. flash drives) that may be easily stolen, to prevent data loss and maintain compliance.BitLocker Drive Encryption1https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGSymantec Endpoint Encryption2https://media.trustradius.com/vendor-logos/cS/FP/URPNU3J7IUQ9-180x180.PNGSafeGuard3https://media.trustradius.com/vendor-logos/aW/xM/0AFACIEHNKRT-180x180.JPEGCheck Point Endpoint Security (Sandblast Agent)4https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGAbsolute5https://media.trustradius.com/product-logos/RW/pE/H8UZNQ7900H2-180x180.JPEGTrustwave Encryption6https://media.trustradius.com/vendor-logos/2A/tk/VKTU2N003FWJ-180x180.jpgDigital Guardian7https://media.trustradius.com/vendor-logos/1C/AW/MUFXF3QSHCIR-180x180.JPEGTrend Micro Endpoint Encryption8https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGDell Data Protection | Encryption Enterprise Edition (DDPE)9https://media.trustradius.com/vendor-logos/QU/Ro/1VKOUZJX2NK3-180x180.PNGMcAfee Complete Data Protection10https://media.trustradius.com/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGCheck Point Full Disk Encryption Software Blade11https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGMicro Focus ZENworks Endpoint Security Management12https://media.trustradius.com/vendor-logos/Zi/ju/TCH0JRTW622Q-180x180.JPEGDell Endpoint Security Suite Enterprise13https://media.trustradius.com/vendor-logos/QU/Ro/1VKOUZJX2NK3-180x180.PNGWave Self-Encrypting Drive Management14SecureDoc15https://media.trustradius.com/product-logos/gB/NZ/BOS8NQTA73AW.jpegMicro Focus ZENworks Suite16https://media.trustradius.com/vendor-logos/Zi/ju/TCH0JRTW622Q-180x180.JPEGPrivilege Manager17https://media.trustradius.com/vendor-logos/YG/lp/TKJT87HBZIFU-180x180.JPEGVormetric Data Security Platform18https://media.trustradius.com/vendor-logos/Vp/gD/D0ORNQNAOLNC-180x180.JPEGZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption)19https://media.trustradius.com/vendor-logos/Zi/ju/TCH0JRTW622Q-180x180.JPEGTrustedDisk20https://media.trustradius.com/vendor-logos/t1/03/GW9B3JVCDZK1-180x180.JPEGVynamic Security Hard Disk Encryption (HDE)21https://media.trustradius.com/vendor-logos/6f/nZ/16ZZEPNUXFPL-180x180.JPEGWhiteboxCRYPTO22https://media.trustradius.com/vendor-logos/Yh/xR/LFU4M40T0TTL-180x180.JPEGEset Endpoint Encryption23https://media.trustradius.com/vendor-logos/db/iK/TTC8O3TI5SN9-180x180.JPEGVormetric Data Security Manager (DSM)24https://media.trustradius.com/vendor-logos/Vp/gD/D0ORNQNAOLNC-180x180.JPEG

Endpoint Encryption Software

Endpoint Encryption Software Overview

What is Endpoint Encryption Software?

Endpoint Encryption Software protects data residing on a computer hard drive (whether a personal computer or a server) and other network endpoints such as USB flash drives, external hard drives, SD memory cards, etc.

Endpoint encryption can happen in one of two ways. The first is encrypting the files or data on a computer. The advantage of this approach is that each file is encrypted and will remain so if it is moved from the source computer to a different computer. The disadvantage is that each file must be encrypted one by one.

A second approach is often called disk encryption of full disk encryption. With this approach, the entire hard disk drive is encrypted. This approach is particularly helpful in the event of device theft or loss as everything on the hard drive is automatically protected. A possible downside of this approach is that if any file on the encrypted disk is moved to another computer or a flash drive, it is no longer encrypted.

Endpoint Encryption Products

Listings (1-24 of 24)

Regulatory compliance, data privacy concerns, and brand reputation often become powerful motivating factors for organizations to take advantage of encryption technologies. Organizations are challenged to protect their sensitive information and ensure compliance with limited resources. Symantec Endp…

8 Ratings

Absolute is an adaptive endpoint security solution. It provides users with a persistent connection to all of their endpoints and the data they contain. The vendor says, by maintaining a two-way connection with each device, users have the insight they need to assess risk and apply remote security mea…

The Digital Guardian Platform from the company company of the same name in Waltham, Massachusetts is an endpoint encryption, mobile data, and data loss protection option (formerly Verdasys).

We don't have enough ratings and reviews to provide an overall score.

Dell Endpoint Security Suite Enterprise is endpoint security and antivirus / antimalware software, created from a partnership between Dell and Cylance. The product includes Dell Encryption technologies for data protection on across physical PCs and virtual desktops, a host-based firewall, the AirGap…

We don't have enough ratings and reviews to provide an overall score.

SecureDoc from Canadian company WinMagic is an endpoint encryption option.

We don't have enough ratings and reviews to provide an overall score.

Privilege Manager from Thycotic in Washington, D.C. is an endpoint protection application emphasizing protection against ransomware and advanced cybersecurity threats and reducing strain on the help desk, with minimal loss of employee time dedicated to privilege and access.

We don't have enough ratings and reviews to provide an overall score.

Micro Focus offers ZENworks Full Disk Encryption (formerly a Novell product before that company's acquisition by Micro Focus), a solution to encrypt desktops and laptops, and also manage encrypted devices in a centralized fashion from a single console. The application is available on its own as need…

We don't have enough ratings and reviews to provide an overall score.

German company Rohde & Schwarz offers TrustedDisk, a compliant endpoint encryption solution for enterprises.

We don't have enough ratings and reviews to provide an overall score.

Mercury Systems headquartered in Andover offers WhiteboxCRYPTO, an encryption management security application.