Wave Report

The Forrester Wave™: Endpoint Encryption, Q1 2015

The Seven Providers That Matter Most And How They Stack Up

January 16th, 2015
CS
Chris Sherman

Summary

Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk, file-level, and media encryption are three of the most commonly used technologies, with many vendors offering multiple options within the same product/suite. In Forrester's 52-criteria evaluation of endpoint encryption vendors, we identified the seven most significant providers in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other, to help S&R professionals select the right partner for their endpoint encryption strategy.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($2995).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.