The difference lies at the point where encryption is applied between the endpoint encryption types. These types are:
Full-Disk Encryption: This encrypts the entire drive using the same settings, encryption algorithm, and secret key. The secret key remains stored on the device that can be accessed when the user successfully logs into the system. With just the secret key, the user can decrypt all files present in the device.
File Encryption: This encrypts selected files. As a result, a user can define which files they want to encrypt, providing granular control.
Endpoint encryption ensures that only authorized users gain access to allowed devices and the sensitive information they contain, eliminating the chances of a breach from physical threats.