According to John Girard, an analyst at Gartner, the main differences among available products derive from their varying approaches to management, encryption strength, user authentication, policy management and value-added features, such as protection of information on removable media.
Here we'll look at two prime considations in selecting encryption solutions, as well as dos and don'ts suggested by veterans of encryption implementation.
The link for this article located at CSO Online is no longer available.