Big companies have many separate systems, many of which have to talk to each other, which means many potential vulnerabilities (often the employees themselves) and you just need one. Compare that to a single hardware device with strong encryption that has a single owner/user.
Latest Answers