Mobile Data Protection (MDP) Solutions Reviews and Ratings

What are Mobile Data Protection (MDP) Solutions?

Gartner defines mobile data protection (MDP) products and services as software security methods that enforce confidentiality policies by encrypting data, and then defending access to that encrypted data on the mass storage systems of end-user workstations. These storage systems include the primary boot drive of a workstation, additional system drives and removable devices used for portability. Storage technologies affected by MDP include magnetic hard-disk drives (HDDs), solid-state drives (SSDs), self-encrypting drives (SEDs), flash drives and optical media. Several methods allow MDP products to delegate all or part of the encryption process to be accomplished by hardware elements, including the CPU and drive controller, and to native capabilities in the OS. Some vendors also have protection capabilities for network storage, and a few also support cloud-based storage environments as an extension to the desktop.

Products In Mobile Data Protection (MDP) Solutions Market

"Bitlocker, just enable it and hide the keys, it is a no brainer, there is no excuse not to"

而不是简单的部署once done it is almost transparent depending on the setup

Read reviews

"The best mobile data protection solution for your business and workforce !"

Harmony Endpoint -Mobile data protection solutions is the first class security and defense solution that enables organizations and professionals to securely access the mobile, tablet and enforce policies and compliance and regulatory measures and frameworks in place and helps in achieving the protected environment, free from all kinds of malware and ransomware attacks and ensure all the corporate official data is secured and no leakage has taken place. Mobile data protection solutions are the next gen advanced security system for corporates and users which ensures safety and security of all corporate data and information and there is no scope of data leaks.

Read reviews

"Great product for data security"

Great product for data protection. It kills all the threats that may affect the data stored in your laptop. Not very expensive and gives an easy to understand reports about the data security. Our team has been using this product since 2 years and are deeply satisfied with the protection it provides.

Read reviews

"Your One Step Data Privacy Solution"

The more the protection the more helpful it is. Trend micro allows maximum protection of company's data by adding an extra layer of security for all company related information and policy control

Read reviews

"Comprehensive data protection"

The products are well made and rarely have problems with them. If there are problems, the service solves them quickly.

Read reviews

"Protection EveryWhere."

It is one of the applications that help us the most to maintain security in mobile equipment inside and outside the organization and help us to keep all our users connected in simple and faster ways, giving us that experience that we all wanted to be able to access, view and share quickly, safely and easily all these communications equipment and services.

Read reviews

"Efficient Encryption tool, but Windows updates are not easy on Encrypted OS"

Symantec Drive Encryption is very good solution to protect our mobile users data on the notebook against to stolen or lost. Encytpion processes takes long time to complete. If you have SATA Disk, you need to wait much longer time for the encryption process to complete.There is no noticeable slowness.after disk completely encrypted. You have to check compatibility before encryption, because you may not boot your machine after encryption completed on unsupported hardware. You may configure Single Sign On feature if you deploy Encryption Management Server instead of Standalone version. Cons, It is not easy to update your operating system that is running on encrypted disk. You may need additional steps like using script or decrypting machine

Read reviews

"Stable full disk encryption suite that allows easy key and certificate management"

稳定的产品做广告。容易啊perate and integrate seamlessly with Active Directory for key management for users and devices. Easy to upgrade and great technical support that goes the extra mile.

Read reviews

"A true cross platform tool and complies with data protection standards "

A user friendly cross platform tool which helps you to secure the workstations so that the data is protected and helps to comply with the data protection standards. At the beginning the system might slow down due to encrypting process but from then it is a seamless experience.

Read reviews

"Easily protect your information with Symantec Endpoint Encryption"

Symantec Endpoint Encryption helps you to encrypt your files and sensitive data helping you with compliance without sacrificing performance.

Read reviews

"Easy rollout, user friendly interface, easy to manage"

Overall our experience has been very positive. We are currently in the rollout process, more specifically in the whitelisting phase. There were a few issues with the integration inside our VM environment but our physical and server rollout was smooth.

Read reviews

"New Technology for MDM"

This is a new technology for us, actually a new technology for many institutions. It includes different scanning patterns and profiles exposure to threats from terminals for M2M cominication to advance company devices, corresponding to different user profiles and user terminals with large traffic quotas.

Read reviews

"Check Point FDE, prevents Data Leakage "

My experience with Check Point FDE in data security has been an amazing one as it has made my job a lot easier in terms of data protection and VPN configuration especially in this era of remote work.

Read reviews
4.8

"“Quality of product and service is very good and affordable”"

1) It is one of the most successful brand in market. 2) Product design is very attractive. 3) Product service is very good and faster. 4) Cost, variety and Quality of product is good and reasonable to customer.

Read reviews

"Consult the vendor and documentation on Best Practices"

Can be difficult to use depending on your implementation

Read reviews
Products 1 - 16