Information Technology

Gartner Glossary

Information-centric Endpoint And Mobile Protection

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.


Experience Gartner virtual conferences

Master your role, transform your business and tap into an unsurpassed peer network through our world-leading virtual conferences.

Gartner Webinars

Expert insights and strategies to address your priorities and solve your most pressing challenges.