Trends Report

Market Overview: Endpoint Encryption Technologies, Q1 2013

Protect Your Sensitive Data With Endpoint Encryption

January 16th, 2013
Chris Sherman, null
Chris Sherman
Chenxi Wang, null
Chenxi Wang
With contributors:


Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk and file-level encryption are two of the most commonly used technologies. While hard disk manufacturers continue to enhance support for hardware-based full disk encryption (FDE), software FDE solutions are improving in both performance and ease of deployment. At the same time, file-level encryption, though less widely deployed, is also enjoying increased adoption as S&R pros realize its various security benefits. This report investigates the current landscape of endpoint encryption technologies. We discuss the pros and cons of different implementation options and best practices to deploy endpoint encryption.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.