Wave Report

The Forrester Wave™: Endpoint Encryption, Q1 2015

The Seven Providers That Matter Most And How They Stack Up

Chris Sherman
 and  two contributors
Jan 16, 2015

Summary

Security and risk (S&R) professionals often turn to endpoint encryption technologies to protect corporate data, meet regulatory requirements, and prevent accidental data leaks. Full disk, file-level, and media encryption are three of the most commonly used technologies, with many vendors offering multiple options within the same product/suite. In Forrester's 52-criteria evaluation of endpoint encryption vendors, we identified the seven most significant providers in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other, to help S&R professionals select the right partner for their endpoint encryption strategy.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($2995).