Encryption Software in Aerospace and Defense

TOP VENDORS
In Encryption Software

  1. THALES GROUP
    0 Reviews
    4.4
  2. GEMALTO
    0 Reviews
    4.1
  3. SYMANTEC CORPORATION
    0 Reviews
    4.1

Find the best Encryption Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

Encryption Software in Aerospace and Defense Quadrant

Comparing [object Object] vendors in Encryption Software across 131 criteria.

KEY BUYING CRITERIA

Below criteria are most commonly used for comparing Encryption Software tools.
Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
1.60
1.60
1.60
Services
5.00
5.00
5.00
Focus on Product Innovation
4.15
4.25
3.95
Delivery
5.00
5.00
5.00
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • Thales e- Security offers solutions such as Vormetric Data Security Platform, Vormetric Data Security Manager, Vormetric Transparent Encryption, Live Data Transformation Extension, Docker Encryption Extension, and Vormetric Transparent Encryption for SAP HANA, Security Intelligence, Vormetric Application Encryption, Vormetric Cloud Encryption Gateway, Vormetric Orchestrator, and Vormetric Protection for Teradata Database. The Vormetric Data Security Platform provides data-at-rest encryption which helps enterprises to comply with regulations at the lowest TCO. The encryption techniques used by the Vormetric Data Security Platform are AES, Format Preserving Encryption (FPE), and transparent file level encryption. The data pseudonymization techniques adopted by Thales e-Security are cryptographic tokenization, random tokenization, dynamic data masking, static data masking, and batch transformation. Vormetric Transparent Encryption efficiently encrypts files and volumes available in the application, database, and infrastructure. Vormetric Transparent Encryption is also supported by the access control and data access audit logging functionality.

    BUYERS
    VENDORS
    EXPERTS
    4.4
    ANALYSTS
     
    • Enterprise
    • Founded: 1893
    • S10BN to $50BN
    • 501 to 1,000
  • Gemalto offers best-in-class layer 2 security, which is capable of encrypting structured and unstructured data in the on-premises and cloud environments. The company has a very strong onpremises encryption portfolio, as it offers Ethernet Encryptors for layer 2 protection. The company offers SafeNet High Speed Encryptors, which are available in various series, such as SafeNet CN9000, SafeNet CN8000, SafeNet CN6000, and SafeNet CN4000. Gemalto’s Ethernet Encryptors provide high assurance, ultra-low latency, and high-speed network performance. The security features supported by Ethernet Encryptors are tamper resistance, anti-probing barriers, flexible encryption policy engine, confidentiality and AES Galois/Counter Mode (GCM) encryption, automatic key management, and traffic flow analysis protection. The performance features of Ethernet Encryptors include minimal latency, high bandwidth, low overhead and high scalability and flexibility.

    BUYERS
    VENDORS
    EXPERTS
    4.1
    ANALYSTS
     
    • SME
    • Amsterdam, Netherlands
    • Founded: 2006
    • $51MN to $100MN
    • 10,001 to 15,000
  • Symantec helps enterprises to safeguard their sensitive data with the help of encryption and also aids in complying with government regulations. Symantec Information Centric Encryption protects sensitive data in the on-premises and cloud environments. Symantec Information Centric Encryption provides the capabilities of Symantec Data Loss Prevention and Symantec CloudSOC technologies. Symantec Information Centric Encryption provides features, such as encryption support for various file formats, cloud file storage encryption support to Box and OneDrive, and deletion of data accessed by unauthorized users. Symantec also offers File Share Encryption, which provides automatic encryption of files stored in the cloud and endpoint environments.

    BUYERS
    VENDORS
    EXPERTS
    4.1
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • IBM Data Guardium can encrypt both structured and unstructured data. It is compatible with tokenization and Security Information and Event Management (SIEM) solutions. The company also provides Key Lifecycle Manager, which aids in the automation and management of encryption keys. The key features of Key Lifecycle Manager include centralized approach, transparent key management, integration of data-at-rest storage systems with the help of the KMIP protocol, reduced cost of key management, and simpler delivery and rotation of keys.

    BUYERS
    VENDORS
    EXPERTS
    3.9
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • McAfee Complete Data Protection is an endpoint data encryption and protection solution that is managed by a single centralized console. It is supported by McAfee ePolicy Orchestrator (McAfee ePO), which efficiently manages Apple FileVault on Mac OS X and Microsoft BitLocker on Windows. Some of the significant features of McAfee Complete Data Protection are drive encryption, file encryption, native encryption management, automated encryption, advanced identification and verification of users with multifactor authentication, Intel Software Guard extensions support, and compatibility with major credential providers. The solution’s native encryption management functionality ensures the encryption functionality is available in Apple FileVault on Mac OS X, and Microsoft BitLocker on Windows can be leveraged by McAfee ePO.

    BUYERS
    VENDORS
    EXPERTS
    3.8
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1987
    • $1BN to $5BN
    • 5,001 to 10,000
  • The features supported by Trend Micro Endpoint Encryption are centralized policy and key management, FIPS 140 encryption certification, AES 256-bit encryption, file and folder encryption, removable media encryption, granular port and device control, selfencrypting drive management, full disk encryption, and network aware pre-boot authentication. The company is also proficient in offering Email Encryption solution which efficiently supports client email, server email, and hosted email encryption at the lowest TCO with minimal maintenance key management.

    BUYERS
    VENDORS
    EXPERTS
    3.7
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1984
    • S10BN to $50BN
    • 50,001 to 75,000
  • It uses Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPsec), AES, Microsoft Azure Storage Service Encryption, and Transparent Data Encryption. TLS/SSL is utilized by Microsoft solutions for encrypting data-in-transit. IPsec ensures that confidentiality, integrity, and availability of data are maintained at the IP packet level. Microsoft provides AES-based encryption for files and folders stored in the Hyper-V virtual machine. Microsoft Azure Storage Service Encryption has various features for encrypting data stored in the Azure Blob storage. Microsoft also offers IaaS virtual machine disk encryption with the help of BitLocker for the Windows OS and DM-Crypt feature for the Linux OS. The company is also focused on database encryption. Azure SQL database data is encrypted with the help of Transparent Data Encryption (TDE). Apart from disk and database encryption, Microsoft is also focused on encryption key management for cloud and on-premises services.

    BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • Enterprise
    • Washington, US
    • Founded: 1975
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    3.0
    ANALYSTS
     
    • Enterprise
    • Palo Alto, California, United States
    • Founded: 2015
    • 10,001 to 15,000
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

TOP REVIEWS

Looking for Encryption Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.