Trend Report

Market Overview: Endpoint Encryption Technologies, Q1 2013

Protect Your Sensitive Data With Endpoint Encryption

Chris Sherman
Chenxi Wang
 and  three contributors
Jan 16, 2013

Summary

Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk and file-level encryption are two of the most commonly used technologies. While hard disk manufacturers continue to enhance support for hardware-based full disk encryption (FDE), software FDE solutions are improving in both performance and ease of deployment. At the same time, file-level encryption, though less widely deployed, is also enjoying increased adoption as S&R pros realize its various security benefits. This report investigates the current landscape of endpoint encryption technologies. We discuss the pros and cons of different implementation options and best practices to deploy endpoint encryption.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).