Save or Share this Report

For Security & Risk Professionals

The Forrester Wave™: Endpoint Encryption, Q1 2015

The Seven Providers That Matter Most And How They Stack Up

January 16, 2015

Why Read This Report

Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk, file-level, and media encryption are three of the most commonly used technologies, with many vendors offering multiple options within the same product/suite. In Forrester's 52-criteria evaluation of endpoint encryption vendors, we identified the seven most significant providers in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other, to help S&R professionals select the right partner for their endpoint encryption strategy.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).

Purchase

Tools And Templates

Vendor Selection Aids

vendor selection icon
  • Forrester Wave™: Endpoint Encryption Market, Q1 2015

Table of Contents

  • Unencrypted Endpoints Place Your Organization At Risk
  • Endpoint Encryption Offers Protection Beyond Simple Compliance
  • Endpoint Encryption Evaluation Overview
  • Evaluation Analysis
  • Vendor Profiles
  • Supplemental Material
  • Related Research Documents

Recommended Research