After being recognized by Gartner as a leader in seven consecutive Magic Quadrants for Mobile Data Protection, we continue our success by once again being named one of the vendors with the most comprehensive data protection solutions in the 2017 version of Gartner’s “Market Guide for Information-Centric Endpoint and Mobile Protection“.
This report, by Gartner analysts John Girard and Brian Reed, replaces the now retired Gartner Magic Quadrant for Mobile Data Protection. It defines eight different methods for information-centric endpoint protection, ranging from basic device protection to comprehensive file-based protection methods.
Of the 21 representative companies discussed in the market guide, Sophos – with Sophos SafeGuard and Sophos Mobile – is, for the second year running, one of few companies that can provide a solution for every single method.
We agree with Gartner that, considering that information is highly mobile in today’s world, data protection solutions can no longer be centered around full disk encryption but should instead account for the many ways that business information needs protection as it moves.
In the report, Gartner recommends that organizations must “choose vendors that invest in standards for information protection interoperability, performance and portability across protection methods, and that leverage security orchestration and automation across multiple security controls.”
Sophos Synchronized Security ensures that your security and information protection methods work together. Sophos SafeGuard, with its always-on file-based encryption, will protect your files wherever they may go – for example when shared across platforms, emailed, or uploaded to cloud-based storage. The revolutionary Synchronized Encryption technology will provide access to encrypted files only if the endpoint is deemed secure and restricts access instantly if it is compromised by malware or other threats. The secure container technology and personal information management (PIM) capabilities in Sophos Mobile provide secure collaboration everywhere, preventing accidental data leakage across mobile devices without compromising security. Both products share encryption keys for a truly seamless user experience accessing encrypted files on any device.
To find out what Gartner says about the Information-Centric Endpoint and Mobile Protection marketplace, download the complete Market Guide.
About Gartner
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
*Gartner Market Guide for Information-Centric Endpoint and Mobile Protection, John Girard and Brian Reed, 19 October 2017