Encryption is the process of converting plain text to cipher text using an encryption algorithm, which may be symmetric or asymmetric. The data encrypted can be deciphered only with an encryption key. Encryption is used to protect the data at rest, data in transit, and data in process in the on-premises and cloud environments. Confidentiality, integrity, and non-repudiation of the data can be achieved by encryption supported with efficient key management. Symmetric key algorithm makes use of only one key for encryption. Asymmetric key algorithm makes use of a pair of keys: public and private keys. With the help of the encryption software, users can efficiently protect the data stored in storage devices, networks, applications, databases, and cloud environment from advanced cyber-attacks.

COMPETITIVE LEADERSHIP MAPPING TERMINOLOGY

The vendors have been placed into 4 categories based on their performance in each criterion: visionary leaders, innovators, emerging, and dynamic.

VISIONARY LEADERS

The visionary leaders receive high scores for most of the evaluation criteria. They have an established product portfolio and a very strong market presence.

INNOVATORS

Innovators have innovative portfolio of services and a strong potential to build robust business strategies for their business growth, to be at par with the Visionary Leaders. Moreover, a strong and dedicated direct and indirect sales channel is one of the key factors influencing the brand position of the firm.

DYNAMIC Differentiators

The dynamic differentiators are established vendors with very strong business strategies. However, they have a low product portfolio. They focus on a specific type of technology related to the product.

EMERGING COMPANIES

The emerging companies have niche product offerings and are starting to gain their position in the market. They do not have much strong business strategies as compared to other established vendors. They might be new entrants in the market and require some more time before getting significant traction in the market.

TOP VENDORS
In Encryption Software

  1. THALES GROUP
    0 Reviews
    4.4
  2. GEMALTO
    0 Reviews
    4.1
  3. SYMANTEC CORPORATION
    0 Reviews
    4.1

E-commerce buying

Buyer has fair idea what to buy

Software
buying

Buyer has partial idea what to buy

We just made B2B buying a lot easier
1Define Requirement
Convert your 3 lines of requirement into 3000 lines of RFQ with your minimal involvement.
2Shortlist Vendors
1. You filtering software by highly customised 360 quadrants
2. Select Vendor’s best differentiated solution to your problem
3Negotiate
Get 3 most granular key weakness of final shortlisted vendor to negotiate better. Plus you can have an online bid.
Filter Software

Sectors

Regions

  • All
  • Asia-Pacific
  • Europe
  • Latin America
  • Middle East and Africa
  • North America

Encryption Software Quadrant

FOR BUYERS
Let our Analyst help you buy the right solution
Tell us about your key problems, key buying criteria
FOR VENDORS
Don’t see your Company?
Request for a free evaluation.
ASK OUR ANALYST

KEY BUYING CRITERIA

Product Maturity
Strategic Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
1.60
1.60
1.60
Services
5.00
5.00
5.00
Focus on Product Innovation
4.25
4.15
3.95
Delivery
5.00
5.00
5.00
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • Thales e- Security offers solutions such as Vormetric Data Security Platform, Vormetric Data Security Manager, Vormetric Transparent Encryption, Live Data Transformation Extension, Docker Encryption Extension, and Vormetric Transparent Encryption for SAP HANA, Security Intelligence, Vormetric Application Encryption, Vormetric Cloud Encryption Gateway, Vormetric Orchestrator, and Vormetric Protection for Teradata Database. The Vormetric Data Security Platform provides data-at-rest encryption which helps enterprises to comply with regulations at the lowest TCO. The encryption techniques used by the Vormetric Data Security Platform are AES, Format Preserving Encryption (FPE), and transparent file level encryption. The data pseudonymization techniques adopted by Thales e-Security are cryptographic tokenization, random tokenization, dynamic data masking, static data masking, and batch transformation. Vormetric Transparent Encryption efficiently encrypts files and volumes available in the application, database, and infrastructure. Vormetric Transparent Encryption is also supported by the access control and data access audit logging functionality.

    BUYER
    VENDOR
    EXPERTS
    4.4
    MNM ANALYSTS
     
  • Gemalto offers best-in-class layer 2 security, which is capable of encrypting structured and unstructured data in the on-premises and cloud environments. The company has a very strong onpremises encryption portfolio, as it offers Ethernet Encryptors for layer 2 protection. The company offers SafeNet High Speed Encryptors, which are available in various series, such as SafeNet CN9000, SafeNet CN8000, SafeNet CN6000, and SafeNet CN4000. Gemalto’s Ethernet Encryptors provide high assurance, ultra-low latency, and high-speed network performance. The security features supported by Ethernet Encryptors are tamper resistance, anti-probing barriers, flexible encryption policy engine, confidentiality and AES Galois/Counter Mode (GCM) encryption, automatic key management, and traffic flow analysis protection. The performance features of Ethernet Encryptors include minimal latency, high bandwidth, low overhead and high scalability and flexibility.

    BUYER
    VENDOR
    EXPERTS
    4.1
    MNM ANALYSTS
     
  • Symantec helps enterprises to safeguard their sensitive data with the help of encryption and also aids in complying with government regulations. Symantec Information Centric Encryption protects sensitive data in the on-premises and cloud environments. Symantec Information Centric Encryption provides the capabilities of Symantec Data Loss Prevention and Symantec CloudSOC technologies. Symantec Information Centric Encryption provides features, such as encryption support for various file formats, cloud file storage encryption support to Box and OneDrive, and deletion of data accessed by unauthorized users. Symantec also offers File Share Encryption, which provides automatic encryption of files stored in the cloud and endpoint environments.

    BUYER
    VENDOR
    EXPERTS
    4.1
    MNM ANALYSTS
     
  • Dell Encryption Enterprise helps customers encrypt data stored in the system drive, external media, and cloud environment. The file and folder encryption capabilities from Dell support several operating systems, such as Windows, Mac, Linux and Android. Dell Encryption Enterprise offers centralized management of policies, supported with authentication modes, such as Single Sign-On (SSO) and smart cards. Dell Encryption External Media ensures that the critical enterprise data stored in the endpoint, server, and removable disk remains encrypted. Encryption is supported for a wide range of USB, removal disk, and smartphone devices. Dell Encryption External Media supports a wide range of security policies and is compatible with Microsoft Windows Server Active Directory tools.

    BUYER
    VENDOR
    EXPERTS
    3.9
    MNM ANALYSTS
     
  • IBM Data Guardium can encrypt both structured and unstructured data. It is compatible with tokenization and Security Information and Event Management (SIEM) solutions. The company also provides Key Lifecycle Manager, which aids in the automation and management of encryption keys. The key features of Key Lifecycle Manager include centralized approach, transparent key management, integration of data-at-rest storage systems with the help of the KMIP protocol, reduced cost of key management, and simpler delivery and rotation of keys.

    BUYER
    VENDOR
    EXPERTS
    3.9
    MNM ANALYSTS
     
  • McAfee Complete Data Protection is an endpoint data encryption and protection solution that is managed by a single centralized console. It is supported by McAfee ePolicy Orchestrator (McAfee ePO), which efficiently manages Apple FileVault on Mac OS X and Microsoft BitLocker on Windows. Some of the significant features of McAfee Complete Data Protection are drive encryption, file encryption, native encryption management, automated encryption, advanced identification and verification of users with multifactor authentication, Intel Software Guard extensions support, and compatibility with major credential providers. The solution’s native encryption management functionality ensures the encryption functionality is available in Apple FileVault on Mac OS X, and Microsoft BitLocker on Windows can be leveraged by McAfee ePO.

    BUYER
    VENDOR
    EXPERTS
    3.8
    MNM ANALYSTS
     
  • The features supported by Trend Micro Endpoint Encryption are centralized policy and key management, FIPS 140 encryption certification, AES 256-bit encryption, file and folder encryption, removable media encryption, granular port and device control, selfencrypting drive management, full disk encryption, and network aware pre-boot authentication. The company is also proficient in offering Email Encryption solution which efficiently supports client email, server email, and hosted email encryption at the lowest TCO with minimal maintenance key management.

    BUYER
    VENDOR
    EXPERTS
    3.7
    MNM ANALYSTS
     
  • Sophos SafeGuard Encryption is capable of encrypting data in the endpoint, cloud, and mobile environments. The product provides file encryption, full-disk encryption, real-time threat protection, and DLP. Sophos SafeGuard Encryption also aids in compliance, reporting, and management by providing detailed reports and audits, role-based management to distinguish authorization levels, secure key management, and efficient centralized policy management of groups and devices. Sophos provides three types of licenses, which include different security modules. Sophos SafeGuard Enterprise license ensures that users can access the benefits of modules, such as full-disk encryption, centrally managed BitLocker and FileVault 2, file/folder encryption, encryption for file shares, encryption for cloud, removable media encryption, synchronized encryption, and management console. Sophos SafeGuard File Encryption license provides access to modules, such as file/folder encryption, encryption for file shares, encryption for cloud, removable media encryption, synchronized encryption, and management console. Sophos SafeGuard Disk Encryption license does not provide encryption facilities for the cloud environment, and the modules supported in the SafeGuard Disk Encryption license are full-disk encryption, centrally-managed BitLocker and FileVault 2, and management console. Sophos SafeGuard products rely on the AES 256 bit algorithm.Sophos also provides professional services and managed services for cybersecurity. Its professional services include security consulting, IT security architecture design, Sophos Quick Start, and enterprise implementation. The company’s managed services include IT security health check, training, managed services and residencies, and project management. Sophos is highly focused on innovations and also invests heavily in R&D activities. Recently, the company launched a new encryption solution, Sophos SafeGuard Encryption 8 which provides advanced encryption to safeguard data from cyber threats, such as malwares, data breaches, and APTs.

    BUYER
    VENDOR
    EXPERTS
    3.5
    MNM ANALYSTS
     
  • The Smartcrypt platform is supported by a Smartcrypt Enterprise Manager which provides enterprises with complete control over their critical data. Smartcrypt Enterprise Manager helps administrators in the enforcement and alignment of encryption policies and management of Smartcrypt agents. Some of the key features of Smartcrypt Enterprise Manager are enhanced encryption key management, simpler key distribution and exchange, enhanced policy management, and data security intelligence. Smartcrypt Enterprise Manager is a virtual appliance or hardware appliance which is integrated with hardware security module and a quantum random number generator.

    BUYER
    VENDOR
    EXPERTS
    3.3
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    3.1
    MNM ANALYSTS
     
  • It uses Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPsec), AES, Microsoft Azure Storage Service Encryption, and Transparent Data Encryption. TLS/SSL is utilized by Microsoft solutions for encrypting data-in-transit. IPsec ensures that confidentiality, integrity, and availability of data are maintained at the IP packet level. Microsoft provides AES-based encryption for files and folders stored in the Hyper-V virtual machine. Microsoft Azure Storage Service Encryption has various features for encrypting data stored in the Azure Blob storage. Microsoft also offers IaaS virtual machine disk encryption with the help of BitLocker for the Windows OS and DM-Crypt feature for the Linux OS. The company is also focused on database encryption. Azure SQL database data is encrypted with the help of Transparent Data Encryption (TDE). Apart from disk and database encryption, Microsoft is also focused on encryption key management for cloud and on-premises services.

    BUYER
    VENDOR
    EXPERTS
    3.0
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.9
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.7
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.6
    MNM ANALYSTS
     
  • The company provides robust inline protection through cloud gateways that support cloud data encryption and tokenization. CipherCloud uses AES 256-bit encryption, NIST-approved key management, and FIPS 140-2 certified validation. CipherCloud’s active encryption technology provides endto- end encryption of cloud data, enhanced control of keys, policy controls, format and function preserving technology, and high scalability with low latency. The company offers a cloud encryption platform for data-at-rest and data-intransit in the on-premises and cloud environments. The preserving cloud functionality is one of the unique features of its CASB platform which enables customers to use the search capability for encrypted data.

    BUYER
    VENDOR
    EXPERTS
    2.3
    MNM ANALYSTS
     
  • ESET offers encryption for hard disks, removable media, files, and emails. The company’s data encryption portfolio is handled by its subsidiary, DESlock and is based on the FIPS 140-2 validated 256-bit AES encryption. The company offers encryption for both client and server sides. The client side uses the MSI package for security and compliance management. The server side takes care of management and encryption enforcement on workstations from remote locations.

    BUYER
    VENDOR
    EXPERTS
    2.3
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.2
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.1
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.0
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    2.0
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    1.9
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    1.9
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    1.8
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    1.7
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    MNM ANALYSTS
     
  • BUYER
    VENDOR
    EXPERTS
    MNM ANALYSTS
     

Questions & Answers

TOP REVIEWS

 

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.