Encryption is the process of converting plain text to cipher text using an encryption algorithm, which may be symmetric or asymmetric. The data encrypted can be deciphered only with an encryption key. Encryption software is used to protect the data at rest, data in transit, and data in process in the on-premises and cloud environments. Confidentiality, integrity, and non-repudiation of the data can be achieved by encryption software supported with efficient key management. Symmetric key algorithm makes use of only one key for encryption. Asymmetric key algorithm makes use of a pair of keys: public and private keys. With the help of the encryption software, users can efficiently protect the data stored in storage devices, networks, applications, databases, and cloud environment from advanced cyber-attacks.

COMPETITIVE LEADERSHIP MAPPING TERMINOLOGY

The vendors in encryption software have been placed into 4 categories based on their performance in each criterion: visionary leaders, innovators, emerging, and dynamic.

VISIONARY LEADERS

The visionary leaders in encryption software category receive high scores for most of the evaluation criteria. They have an established product portfolio and a very strong market presence.

INNOVATORS

Innovators have innovative portfolio of services and a strong potential to build robust business strategies for their business growth, to be at par with the Visionary Leaders. Moreover, a strong and dedicated direct and indirect sales channel is one of the key factors influencing the brand position of the firm.

DYNAMIC DIFFERENTIATORS

The dynamic differentiators are established vendors with very strong business strategies. However, they have a low product portfolio. They focus on a specific type of technology related to the product.

EMERGING COMPANIES

The emerging companies have niche product offerings and are starting to gain their position in the market. They do not have much strong business strategies as compared to other established vendors. They might be new entrants in the market and require some more time before getting significant traction in the market.

In the era of cutting-edge competition, enterprises across the globe are aggressively expanding their businesses, leading to a surge in the number of endpoint nodes, data centers, and cloud storage. This, in turn, is increasing the risks of contamination of the data stored. A large amount of data transferred from the sender to the recipient through the network has to be carefully monitored to safeguard it from active and passive attackers. Encryption standards and protocols need to be sharp to counter the new-generation threats, such as Advanced Persistent Threats (APTs), malware, and ransomware. Data breaches can lead to critical information loss and ultimately cause losses running into millions of dollars. Thus, confidentiality, integrity, and availability of data always remain a subject of concern. The DES available in the 1990s using the 64-bit key for encryption was susceptible to breakdown through brute force. Organizations require highly protective encryption standards and algorithms for safeguarding data from threats. With the rise in IoT and BYOD trend in the IT infrastructure, encryption software are safeguarding every node available on-premises or remotely available and protecting every packet of data present on-premises or available in the cloud. Disk encryption, also known as hard drive encryption, full disk encryption, and whole disk encryption, is the encryption of the entire disk. Whole disk encryption encrypts the entire disk, including swap files, system files, and hibernation files. The importance of encrypting a disk is that even if the encrypted disk is lost or stolen, its encrypted state remains unchanged, and only an authorized user can access its contents. Currently, enormous amounts of data are being generated and stored across organizations. File/folder encryption protects data by encrypting files and folders on desktops, laptops, smartphones, tablets, removable media, Direct-Attached Storage (DAS), Storage Area Network (SAN), and NAS servers, using Common Internet File System (CIFS) or Network File System (NFS) file-sharing protocols. Data is protected from loss, theft, and other types of attacks, such as malware and ransomware. File/folder encryption offers an additional layer of security on top of full disk encryption because once encrypted, files and folders retain their encrypted status, regardless of the data movement. Valuable information consisting of the customer’s personal data, business information, and intellectual property is stored in the form of a database and is warehoused in data centers or virtual storage. Furthermore, companies store these databases in heterogeneous environments, ranging from business networks to diverse types of clouds. Application-level encryption ensures that data is encrypted at the highest level in the system, which makes it invisible to all the levels below. Database-level encryption enables securing the data as it is inserted into, or retrieved from the database. Within the database, data can be encrypted in a specific field, a column, a table, or across the entire database.

Last updated on: Nov 22, 2019

Encryption Software Quadrant

Comparing 37 vendors in Encryption Software across 128 criteria.

Find the best Encryption Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Encryption Software tools.
  • Support and Services
    • Channel for Delivery of Support Services
      • On-Site Support
      • Remote Support
  • Services
    • Services
      • Professional Services
      • Managed Services
    • Professional Services
      • Support and Maintenance
      • Consulting Service
      • Training and education
  • Focus on Product Innovation
    • Type of Algorithm
      • AES
      • Others (RSA, Blowfish, DES)
    • Support and Services
      • Data Encryption
      • Data Loss Prevention
      • Tokenization
      • Key Management
    • Solutions Offered
      • Disk Encryption
      • File/Folder Encryption
      • Database and Application Encryption
      • Communication Encryption (Voice email, and message)
      • Cloud Encryption
    • Deployment Model
      • SaaS
      • PaaS
      • IaaS
    • Applications Catered
      • Data-in-motion encryption
      • Data-at-rest encryption
      • Data-in- process/use encryption
      • Virtual machine instance encryption
      • File level encryption
      • Application-level encryption
      • Column-level encryption
  • Delivery
    • End Users
      • Large Enterprises
      • SMEs
    • Deployment Model
      • On-Premise
      • Cloud
    • Channel of Delivery
      • Directly
      • Through Partners / Third-Party Vendors

TOP VENDORS (37)

  • 1

    Symantec Corporation specializes as a security company and has achieved growth in the encryption software market by delivering information-centric encryption, endpoint encryption, file sharing encryption, desktop email encryption, gateway email encryption, cloud data protection and security, and command line. Symantec helps enterprises to safeguard their sensitive data with the help of encryption and also aids in complying with government regulations. Symantec Information Centric Encryption protects sensitive data in the on-premises and cloud environments. Symantec Information Centric Encryption provides the capabilities of Symantec Data Loss Prevention and Symantec CloudSOC technologies. Symantec Information Centric Encryption provides features, such as encryption support for various file formats, cloud file storage encryption support to Box and OneDrive, and deletion of data accessed by unauthorized users. Symantec also offers File Share Encryption, which provides automatic encryption of files stored in the cloud and endpoint environments.

    Read More
    • Enterprise
    • California, USA
    • $1BN to $5BN
    • 1 to 50
  • 2

    Dell INC has progressed in the encryption software market by providing best-in-class encryption solutions for encrypting data-at-rest, data-in-motion, and data-in-use. The encryption solutions provided by Dell include Dell Encryption Enterprise, Dell Encryption External Media, Dell Data Guardian, and Dell BitLocker Manager. Dell Encryption Enterprise helps customers encrypt data stored in the system drive, external media, and cloud environment. The file and folder encryption capabilities from Dell support several operating systems, such as Windows, Mac, Linux and Android. Dell Encryption Enterprise offers centralized management of policies, supported with authentication modes, such as Single Sign-On (SSO) and smart cards. Dell Encryption External Media ensures that the critical enterprise data stored in the endpoint, server, and removable disk remains encrypted. Encryption is supported for a wide range of USB, removal disk, and smartphone devices. Dell Encryption External Media supports a wide range of security policies and is compatible with Microsoft Windows Server Active Directory tools.

    Read More
    • Enterprise
    • Texas, USA
    • Founded: 1984
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
    • Enterprise
    • New York, USA
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • 4

    McAfee Inc specializes in network security, endpoint security, database security, data protection and encryption, threat protection, server security, web security, and SIEM. The company enhanced its data protection and encryption portfolio by offering three products: McAfee Complete Data Protection, McAfee Complete Data Protection–Advanced, and McAfee Total Protection for DLP. McAfee Complete Data Protection is an endpoint data encryption and protection solution that is managed by a single centralized console. It is supported by McAfee ePolicy Orchestrator (McAfee ePO), which efficiently manages Apple FileVault on Mac OS X and Microsoft BitLocker on Windows. Some of the significant features of McAfee Complete Data Protection are drive encryption, file encryption, native encryption management, automated encryption, advanced identification and verification of users with multifactor authentication, Intel Software Guard extensions support, and compatibility with major credential providers. The solution’s native encryption management functionality ensures the encryption functionality is available in Apple FileVault on Mac OS X, and Microsoft BitLocker on Windows can be leveraged by McAfee ePO.

    Read More
    • Enterprise
    • California, US
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • 5

    Trend Micro Incorporated has progressed in the encryption software market by offering best-in-class data encryption, email encryption, and cloud encryption solutions. Its onpremises encryption portfolio covers encryption for disks, files, and folders available at the endpoints. Trend Micro Endpoint Encryption provides encryption for a mixed environment and also supports self-encrypting drives which are based on technologies from Seagate, TCG OPAL, and OPAL 2. The features supported by Trend Micro Endpoint Encryption are centralized policy and key management, FIPS 140 encryption certification, AES 256-bit encryption, file and folder encryption, removable media encryption, granular port and device control, selfencrypting drive management, full disk encryption, and network aware pre-boot authentication. The company is also proficient in offering Email Encryption solution which efficiently supports client email, server email, and hosted email encryption at the lowest TCO with minimal maintenance key management.

    Read More
    • Enterprise
    • Tokyo, Japan
    • $1BN to $5BN
    • 5,001 to 10,000
  • 6

    Sophos Ltd is a cybersecurity company that offers solutions and services for endpoint security, network security, web security, email security, and cloud security. Sophos has grown in the encryption software market by providing Sophos SafeGuard Encryption which encrypts the file at the time of creation and prevents unauthorized users from accessing the encrypted data. Sophos SafeGuard Encryption is capable of encrypting data in the endpoint, cloud, and mobile environments. The product provides file encryption, full-disk encryption, real-time threat protection, and DLP. Sophos SafeGuard Encryption also aids in compliance, reporting, and management by providing detailed reports and audits, role-based management to distinguish authorization levels, secure key management, and efficient centralized policy management of groups and devices. Sophos provides three types of licenses, which include different security modules.

    Read More
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • 7

    The Smartcrypt platform is supported by a Smartcrypt Enterprise Manager which provides enterprises with complete control over their critical data. Smartcrypt Enterprise Manager helps administrators in the enforcement and alignment of encryption policies and management of Smartcrypt agents. Some of the key features of Smartcrypt Enterprise Manager are enhanced encryption key management, simpler key distribution and exchange, enhanced policy management, and data security intelligence. Smartcrypt Enterprise Manager is a virtual appliance or hardware appliance which is integrated with hardware security module and a quantum random number generator.

    Read More
    • Enterprise
    • 501 to 1,000
  • 8

    Microsoft Corporation provides business cloud services and solutions that efficiently encrypt data residing in the enterprise network. The company uses secure transfer protocols to safely move data between the data centers and endpoints. Microsoft provides inbuilt encryption for dataat- rest and data-in-transit, and relies on the Microsoft Public Key Infrastructure for the authentication of users and endpoints. It uses Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPsec), AES, Microsoft Azure Storage Service Encryption, and Transparent Data Encryption. TLS/SSL is utilized by Microsoft solutions for encrypting data-in-transit. IPsec ensures that confidentiality, integrity, and availability of data are maintained at the IP packet level. Microsoft provides AES-based encryption for files and folders stored in the Hyper-V virtual machine. Microsoft Azure Storage Service Encryption has various features for encrypting data stored in the Azure Blob storage. Microsoft also offers IaaS virtual machine disk encryption with the help of BitLocker for the Windows OS and DM-Crypt feature for the Linux OS. The company is also focused on database encryption. Azure SQL database data is encrypted with the help of Transparent Data Encryption (TDE). Apart from disk and database encryption, Microsoft is also focused on encryption key management for cloud and on-premises services.

    Read More
    • Enterprise
    • Washington, USA
    • Founded: 1975
    • More than $100 BN
    • 1,00,001 to 5,00,000
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
  • 11

    The company provides robust inline protection through cloud gateways that support cloud data encryption and tokenization. CipherCloud uses AES 256-bit encryption, NIST-approved key management, and FIPS 140-2 certified validation. CipherCloud’s active encryption technology provides endto- end encryption of cloud data, enhanced control of keys, policy controls, format and function preserving technology, and high scalability with low latency. The company offers a cloud encryption platform for data-at-rest and data-intransit in the on-premises and cloud environments. The preserving cloud functionality is one of the unique features of its CASB platform which enables customers to use the search capability for encrypted data.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
  • 13

    ESET specializes in endpoint security, server security, and remote management. The company’s endpoint security portfolio includes products such as endpoint protection, data encryption, mobile and table protection, and two-factor authentication. ESET offers encryption for hard disks, removable media, files, and emails. The company’s data encryption portfolio is handled by its subsidiary, DESlock and is based on the FIPS 140-2 validated 256-bit AES encryption. The company offers encryption for both client and server sides. The client side uses the MSI package for security and compliance management. The server side takes care of management and encryption enforcement on workstations from remote locations.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • Inverness, UK
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 51 to 100
    • Enterprise
    • SME
    • 501 to 1,000
    • Startup
    • Campbell, California, US
    • Founded: 2013
    • $50BN to $100BN
    • 101 to 500
    • Enterprise
    • 51 to 100
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • 51 to 100
  • 25

    CryptoMove is one of the most reliable names when it comes to offering authentic management products. The platform has to its credit of protecting configurations, moving target defence, apps, and API keys. The inception of the company has been to provide various businesses with its flagship product- cloud-based key vault. The company's approach has been leveraged by several federal agencies to develop different prototypes for database and file protection and securing live streaming video as well.

    Read More
    • Enterprise
    • 51 to 100
    • SME
    • California, US
    • Founded: 2012
    • $51MN to $100MN
    • 501 to 1,000
    • Enterprise
    • Enterprise
    • Enterprise
    • 51 to 100
    • Enterprise
    • Berkshire, England
    • Founded: 1976
    • $1BN to $5BN
    • 501 to 1,000
    • Enterprise
    • 51 to 100
    • Enterprise
    • 1 to 50
  • 33

    Thales e-Security specializes as a data encryption company for the data center, cloud, big data, and container environments. Its wide portfolio includes data encryption, tokenization and masking, key management, digital signing, and hardware security modules. Thales e- Security offers solutions such as Vormetric Data Security Platform, Vormetric Data Security Manager, Vormetric Transparent Encryption, Live Data Transformation Extension, Docker Encryption Extension, and Vormetric Transparent Encryption for SAP HANA, Security Intelligence, Vormetric Application Encryption, Vormetric Cloud Encryption Gateway, Vormetric Orchestrator, and Vormetric Protection for Teradata Database. The Vormetric Data Security Platform provides data-at-rest encryption which helps enterprises to comply with regulations at the lowest TCO. The encryption techniques used by the Vormetric Data Security Platform are AES, Format Preserving Encryption (FPE), and transparent file level encryption. The data pseudonymization techniques adopted by Thales e-Security are cryptographic tokenization, random tokenization, dynamic data masking, static data masking, and batch transformation. Vormetric Transparent Encryption efficiently encrypts files and volumes available in the application, database, and infrastructure. Vormetric Transparent Encryption is also supported by the access control and data access audit logging functionality.

    Read More
    • Enterprise
    • 501 to 1,000
    • Enterprise
    • Enterprise
    • California, USA
    • Founded: 2014
    • Below $10 MN
    • 101 to 500
    • Enterprise
    • Enterprise
    • 501 to 1,000

TOP REVIEWS

Looking for Encryption Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

...

Marie Stelle

Engagement Partner - 360Quadrants.com