Innovation at Its Best: Full Disk Encryption Market Outlook

As I was reviewing Gartner’s 2014 Magic Quadrant (MQ) for Mobile Data Protection, not surprisingly I found that nearly every competitor on that grid offers more than just data encryption. With anti-virus and firewall solutions being the primary focus, data encryption literally seems to be a check mark on their existing arsenal.

So how does one innovate when the focus is on a “million” other things to address customer’s security needs?

Let me paint a little picture to give you some perspective. It is a no brainer that within the full disk encryption (FDE) space, self-encrypting drives (SEDs) or hardware encryption will take over software encryption in the near future. It is because the said technology is simple and least disruptive, since the encryption takes place on the hard drive; without being dependent on any software, OS, etc. SEDs are built based on Opal specifications that are put together by Trusted Computing Group (TCG). The latest Opal specification (2.0) was published back in 2012, which many vendors on the MQ have yet to support.

The fact of the matter is that there are a very few software vendors out there who focus solely on data encryption and key management. WinMagic does! And we have a long history of innovation within the FDE space. Innovations such as PBConnex that changed the FDE management landscape by providing pre-boot network authentication. It utilizes network based resources to authenticate users, enforce access controls, and manage end point devices before the operating system loads. Think about utilizing the capabilities of PBConnex on SEDs, TCG Enterprise Drives, BitLocker, FileVault 2, all from a single pane of glass!

So, depending on your needs, there is a grocery store where you can choose to buy your groceries from and an electronics store where you can choose to buy your television from, but also a store that has both, but doesn’t offer as much variety found in the specialist stores.

Choosing the best FDE solution should be done with the same perspective in mind. Where would you rather buy your FDE from??

 

Previous Post
When Should Data Encryption Be Used to Protect My Business?
Next Post
What Every Employer Needs to Know About Apple’s iPhone 5

Related Posts

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

6 Best Practices for Secure Health Information

Holistic, comprehensive security strategies, centered on protecting data, not devices, are easier than ever thanks to current encryption technology. According to a recent Ponemon Institute study, over the last five years healthcare organizations have slowly increased their investment in data…
Read more

Come one, come all

Last week we announced the results of the Ponemon Institute study we commissioned and had co-sponsored by leading industry SED partners. We wanted to take this opportunity to remind readers that next week we’ll be reviewing the data via a…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
 
Contact Us
 

This will close in 0 seconds