PointSec Mobile, Media Encyrption, Full Disk Encryption
Check Point Software Technologies
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Check Point's mobile data security products came out on top in a strong field in this critical category, as organizations are moving swiftly to secure data on their endpoints and mobile devices. Readers were particularly impressed by the Check Point's granular and flexible policy controls, and central management tools, including its handling of those troublesome encryption keys.
Symantec Mobile Security Suite for Windows Mobile
Symantec mobile device security products, including the Windows suite and Mobile Security for Symbian, tackle the growing challenge of security in an environment in which smart phones and PDAs are holding and exposing more and more corporate data. Readers were most impressed with Symantec's policy controls, and also liked its central management and data protection capabilities.
McAfee Endpoint Encryption
Reader response to McAfee Endpoint Encryption, as well as Total Protection for Data, which incorporates additional capabilities, such as endpoint DLP, device and application control, shows that McAfee's acquisition and product development choices are resonating well among users. They liked the granular and flexible policies controls and were very pleased with their return on investment.
"Disk encryption for laptops is taking hold, and making inroads into the smartphone market. Every large security vendor either offers a disk encryption product (usually full-disk) that they own themselves, or offer via OEM relationship. Deployments are being fueled by disclosure laws like MA-201, and the American Recovery and Reinvestment Act (ARRA), which focuses on health care." -- Andrew Jaquith, senior analyst, Forrester Research
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products