Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Best Mobile Data Security Products

Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption, removable storage device (CD/DVDs, USB drives, digital music players) control, and smart phone and other handheld device data protection.

PointSec Mobile, Media Encyrption, Full Disk Encryption
Check Point Software Technologies

Check Point's mobile data security products came out on top in a strong field in this critical category, as organizations are moving swiftly to secure data on their endpoints and mobile devices. Readers were particularly impressed by the Check Point's granular and flexible policy controls, and central management tools, including its handling of those troublesome encryption keys.

Symantec Mobile Security Suite for Windows Mobile

Symantec mobile device security products, including the Windows suite and Mobile Security for Symbian, tackle the growing challenge of security in an environment in which smart phones and PDAs are holding and exposing more and more corporate data. Readers were most impressed with Symantec's policy controls, and also liked its central management and data protection capabilities.

McAfee Endpoint Encryption

Reader response to McAfee Endpoint Encryption, as well as Total Protection for Data, which incorporates additional capabilities, such as endpoint DLP, device and application control, shows that McAfee's acquisition and product development choices are resonating well among users. They liked the granular and flexible policies controls and were very pleased with their return on investment.

"Disk encryption for laptops is taking hold, and making inroads into the smartphone market. Every large security vendor either offers a disk encryption product (usually full-disk) that they own themselves, or offer via OEM relationship. Deployments are being fueled by disclosure laws like MA-201, and the American Recovery and Reinvestment Act (ARRA), which focuses on health care." -- Andrew Jaquith, senior analyst, Forrester Research


  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products

Dig Deeper on BYOD and mobile device security best practices

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.