Endpoint Encryption

Data protection with encryption for desktops, laptops, and removable media

Overview

The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplified as more and more employees bring their own computing devices to work. Ensuring that sensitive data is secured in the case of device loss has never been more difficult.

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Software and Hardware

remove add

 

Protection Points

  • Laptops, desktops
  • Removable media: USB/CD/DVD
  • Files and file volumes (folders)
     

Threat Protection

  • Privacy
  • Data protection
  • Regulatory compliance
  • Securing intellectual property
     

Advantages

remove add

 

Maximize Platform Coverage for Data and Device Encryption

Get comprehensive data protection on Macs and PC laptops, desktops, removable media, and mobile devices

  • Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption
  • Support and leverage flexible hardware and software-based encryption across mixed environments
  • Support self-encrypting TCG OPAL and OPAL 2 SED drives from Seagate, SanDisk®, and Intel®
  • Simplify deployment and management with support for unified extensible firmware interface (UEFI), multiple physical drives, and pre-boot screen customization
  • Enable automatic and transparent encryption without performance degradation
     

Lower Total Cost of Ownership (TCO) with Centralized Policy Administration and Transparent Key Management

Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption

  • Manage the encryption policy alongside all endpoint security policies with integration to a common management console, Trend Micro™ Control Manager™
  • Gain visibility and control over encryption, monitoring, and protection of data
  • Automate policy enforcement with remediation of security events, without the burden of encryption key management
  • Tight integration with Trend Micro™ Integrated Data Loss Prevention (iDLP) delivers content-based encryption for data at rest and in motion
     

Simplify Remote Device Management

  • Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password
  • Manage policies and protect data on PCs, Macs, laptops, desktops, USBs, and removable media
  • Collect device-specific information such as device attributes, directory listing, and unique device IDs based on device name, MAC address, and central processing unit (CPU) identifier
  • Improve protection for remote devices with tools to remotely lock, reset, or “kill” lost or stolen devices—even before a device boots using network-aware pre-boot authentication
     

Key features

remove add

 

Advanced Reporting and Auditing

  • Unify visibility and policy deployment with other Trend Micro products through integration with Control Manager
  • Automate enforcement of regulatory compliance with policy-based encryption
  • Receive detailed auditing and reporting by individual, organizational unit, and device
  • Assist compliance initiatives with an audit trail for all administrative actions
  • Demonstrate compliance on demand with real-time auditing
     

Administrative Tools and Active Directory Integration

  • Provide remote one-time passwords across all endpoint client applications
  • Manage users and groups from multiple active directory domains in a single console, simplifying the existing IT infrastructure for deployment and management
  • Gain access to recovery console in the Microsoft® Windows® pre-boot
     

Pre-Boot Authentication

  • Gain flexible authentication, including active directory integration, fixed password, and multi-factor authentication for government and defense customers
  • Ensure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (WiFi and ethernet)
  • Enable policy updates prior to authentication
  • Trigger the lockout feature in response to incorrect authentication attempts
  • Configure actions on failed password attempt threshold
  • Support multiple user and administrator accounts per device
     

Support for a Consumerized Environment

  • Provide management and visibility for Microsoft® BitLocker®, this is especially useful for employee-owned devices where corporate data needs to be protected
  • Provide visibility and management of Apple® FileVault® to enforce policies on Macs, and protect them in the case of loss or theft
     

Key Benefits

remove add

 

  • Helps ensure privacy and compliance enforcement with policy-based encryption
  • Lowers TCO with simplified deployment, configuration, and management
  • Provides comprehensive data security for laptops, desktops, removable media, and mobile devices
  • Helps ensure robust security through certifications including the Federal Information Processing Standard (FIPS) Publication 140-2 certification
  • Maintains compliance and protects your data without disrupting users with remote management
     

* Management for Bitlocker and FileVault is included with Trend Micro Endpoint Encryption.

** Dependent on the OS version and machine model.

Get the security you need with flexible deployment and licensing options

Endpoint Encryption is a critical component of our Smart Protection Suites. Our suites deliver even more data protection capabilities, like data loss prevention (DLP) and device control, as well as our threat protection capabilities, including file reputation, machine learning, behavioral analysis, exploit protection, application control, and intrusion prevention. Having additional Trend Micro solutions extends your protection from advanced attacks with endpoint investigation and detection. All of this modern threat security technology is made simple for your organization with central visibility, management, and reporting.

Man with glasses