Information Technology

Gartner Glossary

Information-centric Endpoint And Mobile Protection

Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.


Read reviews of Information-Centric Endpoint and Mobile Protection…

Gartner Peer Insights has over 184 reviews on 10+ vendors in the Information-Centric Endpoint and Mobile Protection market. Learn about these companies and these products from IT professionals who have first-hand experience with them.

 

Discover Gartner Conferences

There are multiple Gartner conferences available in your area. Transform your business and experience the value of Gartner, live and in person.