Skip to content

Trend Micro Endpoint Encryption

Pinterest
More Options

Full disk, file encryption and data protection

Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with full disk encryption, folder and file encryption, and removable media encryption. 

  • Protect data at rest with full disk encryption software
  • Automate data management with self-encrypting hard drives
  • Encrypt data in specific files, shared folders, removable media
  • Set granular policies for device control and data management

Secure data on your PCs, Macintoshes, CDs, DVDs, and USB flash drives with full disk encryption, folder and file encryption, and device control.

Trend Micro™ endpoint encryption helps you prevent data theft and accidental data loss along with the compliance violations, reputation damage, and revenue loss. Endpoint Encryption can be managed as a standalone solution or integrated with other Trend Micro products, such as OfficeScan and Control Manager.

Centralized visibility and control

A single console makes it easy to manage encryption keys and synchronize policy across all encryption components. It also enforces secure authentication and provides the real-time auditing tools to ensure regulatory compliance. Other data management features include user-based self-help options and remote device control. Trend Micro Control Manager can also be used to provide a unified management console with other Trend Micro products. The encryption client can also be deployed with Trend Micro OfficeScan endpoint security.

Full disk encryption

In the event a device is lost or stolen, full disk encryption ensures your data is unreadable. We offer a software- or hardware-based solution to fit your needs. For low startup costs, our software-based full disk encryption uses FIPS-140 certified and Common Criteria  encryption with a network-aware pre-boot authentication. When automation and ease-of-use are a priority, our hardware-based full disk encryption deploys and manages self-encrypting drives using the OPAL and OPAL 2 standard.

Folder and file encryption

Encrypt select files, folders, or external media by using a drag and drop, single-click capability. Users simply need a user key, group key, static one-time password, or smartcard certificate. Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization.

Removable media encryption

Allow administrators to enforce policy and protect data that is copied to removable media such as USB drives, CDs and DVDs. From the centralized policy console, encryption can be enforced or made optional for users writing to these devices.

Support for Native Encryption

Trend Micro Endpoint Encryption can manage Microsoft BitLocker and Apple FileVault which are encryption products delivered within the operating systems. Now corporate policy and control can be applied to those devices without the need to install an encryption agent.


Audit-ready user and device management

In the event you lose a device, compliance mandates may require you to prove the device was encrypted. Trend Micro Endpoint Encryption’s advanced management console offers real-time status reports, including the last time a particular device was connected to your network. And with devices that have network-aware pre-boot options, administrators can reset or “kill” a lost or stolen device before it re-boots. The central management console has capabilities to recover lost data, update policies, and deploy new devices with ease.

Data encryption and authentication to fit your needs

Trend Micro Endpoint Encryption is available in a variety of platform options. Full disk encryption can be deployed as a software solution or OPAL and OPAL 2 compliant self-encrypting drives. Whatever the method, all devices are secured with a robust AES256 encryption algorithm. There are many options for user authentication, including RSA SecureID tokens.

Support for more devices, more platforms

Choose between managing encryption keys available through OS vendors such as Microsoft BitLocker or Macintosh FileVault. Or deploy Trend Micro's advanced encryption agent to your devices.

Data encryption certifications to ensure compliance

Industry mandates and legislation often describe how devices should be encrypted and require detailed product certifications. Trend Micro encryption products are covered by the most stringent and up-to-date standards, such as FIPS-140-2/3, Common Criteria, and NSTISSP to name a few.

Lower cost of endpoint encryption

Reduce your cost of ownership through integration with other Trend Micro management tools and innovative deployment capabilities that let you easily deploy without disrupting users. Once deployed, the automated reporting, auditing, and policy updating means that administering encrypted devices is easy. An optional end-user self-service portal for password administrationfurther reduces IT management.


Minimum Requirements

Policy Server

Windows 2003, 2008, 2008 R2

  • 2GHz Dual Quad Core Core2 IntelTM XeonTM Processors
  • 4GB RAM
  • 40GB Raid 1 hard disk space

FDE / FE

Windows XP Vista, 7, 8

  • Intel Core 2 or compatible processor
  • 1GB RAM
  • 30GB hard disk with 20% free space

 

BitLocker

Windows 7, 8

  • Intel Core 2 or compatible processor
  • 1GB RAM
  • TPM 1.2 or higher
  • 30GB hard disk with 20% free space

FileVault

OS X 10.7, 10.8, 10.9

  • Intel Core 2 or compatible processor
  • 2GB RAM
  • 8GB hard disk



Connect with us on