Save or Share this Report

For Security & Risk Professionals

Market Overview: Endpoint Encryption Technologies, Q1 2013

Protect Your Sensitive Data With Endpoint Encryption

January 16, 2013


Why Read This Report

Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk and file-level encryption are two of the most commonly used technologies. While hard disk manufacturers continue to enhance support for hardware-based full disk encryption (FDE), software FDE solutions are improving in both performance and ease of deployment. At the same time, file-level encryption, though less widely deployed, is also enjoying increased adoption as S&R pros realize its various security benefits. This report investigates the current landscape of endpoint encryption technologies. We discuss the pros and cons of different implementation options and best practices to deploy endpoint encryption.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).


Table of Contents

  • Your Organization's Endpoints Place Sensitive Data At Risk
  • Leverage Endpoint Encryption To Protect Your At-Rest Data
  • To Choose The Right Encryption Technology, Know Your Options
  • Endpoint Encryption Offers Much More Than Simple Compliance
  • Vendor Landscape Overview

  • Endpoint Encryption Is An Essential Tool In Your Security Arsenal
  • Supplemental Material
  • Related Research Documents

Recommended Research