Endpoint Encryption Software

Endpoint Encryption Software Overview

Endpoint Encryption Software protects data residing on a computer hard drive (whether a personal computer or a server) and other network endpoints such as USB flash drives, external hard drives, SD memory cards, etc.Endpoint encryption protects data on a given endpoint by making it unreadable without using the proper decryption key.

The software can encrypt data on a file-by-file basis or encrypt everything within the hard drive or disk on the endpoint. Endpoint encryption software provides the encrypting agent on each endpoint. It also provides the key management features so that endpoints within an organization can encrypt/decrypt across devices as needed.

Endpoint encryption is an important part of the shift towards endpoint security within business’s overall security strategy. Endpoint encryption protects data both within and outside of the network. This provides more security in the event that other systems or the endpoint itself is compromised. This granular level of security helps protect organizations that have Bring Your Own Device (BYOD) policies by securing data on a variety of endpoints, including personal devices.

Endpoint encryption software also reduces the administrative overhead associated with encryption programs. The software centralizes policy administration and key management to a single application or console. The software also provides better documentation and reporting to ensure compliance with internal security policies and external auditing processes.

Endpoint Encryption Products

(1-25 of 28) Sorted by Most Reviews

The list of products below is based purely on reviews (sorted from most to least). There is no paid placement and analyst opinions do not influence their rankings. Here is our Promise to Buyers to ensure information on our site is reliable, useful, and worthy of your trust.
Bitdefender GravityZone

Bitdefender GravityZone combines multiple security services into a single platform to reduce the cost of building a trusted environment for endpoints.

Key Features

  • Malware Detection (58)
    94%
    9.4
  • Anti-Exploit Technology (54)
    90%
    9.0
  • Centralized Management (58)
    90%
    9.0
BitLocker Drive Encryption

Microsoft's BitLocker is an endpoint encryption option.

Symantec Endpoint Encryption

Regulatory compliance, data privacy concerns, and brand reputation often become powerful motivating factors for organizations to take advantage of encryption technologies. Organizations are challenged to protect their sensitive information and ensure compliance with limited resources.…

Virtru

Virtru in Washington DC offers email encryption software and persistent data security, privacy and loss prevention.

Sophos Central Device Encryption (formerly SafeGuard)

Sophos Central Device Encryption is a full disk encryption solution, based on the SafeGuard technology acquired with Utimaco by Sophos in 2008.

WinZip

WinZip, a Corel Corporation product, is a file management tool, providing file compression, file or document encryption, PDF file manipulation, and file cleanup.

Dell Data Protection | Encryption Enterprise Edition (DDPE)

Dell Data Protection | Encryption Enterprise Edition (DDPE) presents software-based Data Centric Encryption designed to enable IT to enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t…

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Check Point Endpoint Media Encryption and Port Protection solution, based on technology acquired with the former Pointsec, is an endpoint encryption option from Check Point Software Technologies in California.

Trustwave Encryption

Chicago-based Trustwave offers endpoint encryption.

McAfee Complete Data Protection

McAfee Complete Data Protection is an endpoint encryption and data loss protection option from McAfee, available in basic and advanced versions.

Micro Focus ZENworks Endpoint Security Management

Micro Focus ZENworks Endpoint Security Management (formerly Novell ZENworks Endpoint Security Management) is a location-aware, policy-based solution that protects the data on every PC, controls how endpoints communicate and access information, and monitors and maintains the health…

Dell Endpoint Security Suite Enterprise

Dell Endpoint Security Suite Enterprise is endpoint security and antivirus / antimalware software, created from a partnership between Dell and Cylance. The product includes Dell Encryption technologies for data protection on across physical PCs and virtual desktops, a host-based…

Wave Self-Encrypting Drive Management

Wave offers a self-encrypting drive option.

Micro Focus ZENworks Suite

Micro Focus ZENworks Suite is an endpoint encryption option consisting of 7 integrated security products.

CipherTrust Application Data Protection, formerly Vormetric & SafeNet ProtectApp

CipherTrust Application Data Protection offers software tools for application-level key management and encryption of sensitive data. The solution enables encryption of data passing through an application. CipherTrust Application Data Protection can be deployed in physical, private…

ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption)

Micro Focus offers ZENworks Full Disk Encryption (formerly a Novell product before that company's acquisition by Micro Focus), a solution to encrypt desktops and laptops, and also manage encrypted devices in a centralized fashion from a single console. The application is available…

TrustedDisk

German company Rohde & Schwarz offers TrustedDisk, a compliant endpoint encryption solution for enterprises.

Vynamic Security Hard Disk Encryption (HDE)

Diebold Nixdorf offers the Vynamic Security Hard Disk Encryption (HDE) application, supporting banking institutions and retailers with protection against unauthorized access of sensitive files and systems.

WhiteboxCRYPTO

Mercury Systems headquartered in Andover offers WhiteboxCRYPTO, an encryption management security application.

PKWARE Smartcrypt

Smartcrypt Transparent Data Encryption (TDE), from PKWARE protects sensitive information at rest on enterprise servers and ensures compliance with a wide range of regulatory requirements and customer privacy mandates. It aims to eliminate the negative effects of theft or accidental…

CipherTrust Transparent Encryption (formerly  Vormetric Transparent Encryption)

CipherTrust Transparent Encryption (formerly known as Vormetric Transparent Encryption) from Thales delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. This protects data wherever it resides, on-…

Secure.Systems, by SyncDog

SyncDog offers a FIPS 140-2 Certified, AES 256 bit encrypted, end-to-end mobile security solution. SyncDog protects and manages the device, detects and prevents malware/phishing and other intrusions, encrypts & isolates all the corporate or government data/files/apps that are…

Ubiq Security, Inc.

The Ubiq platform is an API-based developer platform that enables developers to build customer-side data encryption into any application, across multiple programming languages, without requiring prior encryption knowledge or expertise. And as new cryptography and encryption innovations…

NordLocker

NordLocker enables users to secure any file on a computer. Encryption is compatible with files of all types and sizes. Whether it’s a tiny PDF from work or your holiday in HD video, encrypted file storage can be used to secure it all. NordLocker’s file encryption has no limits. It…

Aiden Technologies

Aiden is an AI-powered endpoint management solution for Microsoft Windows.

Learn More About Endpoint Encryption Software

What is Endpoint Encryption Software?

Endpoint Encryption Software protects data residing on a computer hard drive (whether a personal computer or a server) and other network endpoints such as USB flash drives, external hard drives, SD memory cards, etc.Endpoint encryption protects data on a given endpoint by making it unreadable without using the proper decryption key.

The software can encrypt data on a file-by-file basis or encrypt everything within the hard drive or disk on the endpoint. Endpoint encryption software provides the encrypting agent on each endpoint. It also provides the key management features so that endpoints within an organization can encrypt/decrypt across devices as needed.

Endpoint encryption is an important part of the shift towards endpoint security within business’s overall security strategy. Endpoint encryption protects data both within and outside of the network. This provides more security in the event that other systems or the endpoint itself is compromised. This granular level of security helps protect organizations that have Bring Your Own Device (BYOD) policies by securing data on a variety of endpoints, including personal devices.

Endpoint encryption software also reduces the administrative overhead associated with encryption programs. The software centralizes policy administration and key management to a single application or console. The software also provides better documentation and reporting to ensure compliance with internal security policies and external auditing processes.

Endpoint Encryption Strategies

Endpoint encryption can happen in one of three ways. The first is encrypting the files or data on a computer. The advantage of this approach is that each file is encrypted and will remain so if it is moved from the source computer to a different computer. The disadvantage is that each file must be encrypted one by one. This strategy is most applicable to organizations with BYOD policies, in which case only company data is encrypted.

A second approach is often called disk encryption of full disk encryption. With this approach, the entire hard disk drive is encrypted. This approach is particularly helpful in the event of device theft or loss as everything on the hard drive is automatically protected. A possible downside of this approach is that if any file on the encrypted disk is moved to another computer or a flash drive, it is no longer encrypted. This is a very common approach for company-owned endpoints, such as servers.

A newer method of encryption is transparent file encryption. This method is based on predefined policies that identifies sensitive data and encrypts it specifically. In this case, the data stays encrypted even if it leaves the endpoint. Transparent file encryption is not universally offered. It is most applicable when all relevant devices have the client necessary to encrypt and decrypt each other’s data as necessary, while also protecting against single-endpoint breaches.

Endpoint Encryption Software Comparison

When comparing endpoint encryption solutions, consider these factors:

  • Encryption Strategies: Does the organization need to encrypt specific files, classes of files, or everything on given endpoints? These distinctions will help determine which methods of encryption are most helpful for the business, and if the product needs to support multiple or all encryption strategies.

  • Scalability: As with all endpoint security products, scalability is a key factor for long-term viability. Multiple considerations impact scalability, such as pricing, mass device management, and the range of endpoint types protected (such as IoT devices).


Start an endpoint encryption software comparison here


Frequently Asked Questions

How does endpoint encryption work?

Endpoint encryption protects data stored on an endpoint by making it unreadable to anything that doesn’t have the proper decryption key. This can be done to all data on an endpoint’s hard drive, or on a file-by-file basis.

What is end to end encryption?

End to end encryption encrypts a message before sending it to another device, so only the sending and receiving devices can decrypt the message or data. It is similar to, but not synonymous with, endpoint encryption.

Why should I use endpoint encryption?

Endpoint encryption provides another layer of security in the event that other protection layers are compromised.

Who uses endpoint encryption software?

Endpoint encryption is most commonly used by organizations that have a wide range of endpoints that interact with sensitive or at-risk data.