ENDPOINT ENCRYPTION

Robust encryption and device control for desktops, laptops, and removable media

Overview

The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplified as more and more employees bring their own computing devices to work in the name of productivity. Ensuring that sensitive data is secured in the case of device loss has never been more difficult.

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices— PC and Macintosh laptops, desktops, CDs, DVDs, USB drives, and any other removable media. This solution combines enterprise-wide full disk, le/folder, and removable media encryption with granular port and device control to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically— using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. 

Software & Hardware

Protection Points

  • Laptops, desktops
  • Removable media: CD/DVD/USB
  • Files and file volumes (folders)

 

Threat Protection

  • Privacy
  • Data protection
  • Regulatory compliance
  • Securing Intellectual property

Advantages

Maximize platform coverage for data and device encryption

Get comprehensive data protection on Macintosh and PC laptops, desktops, removable media, and mobile devices

 

Lower TCO with centralized policy Administration and Key Management

Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption

 

Simplify remote device Management

 

Key features

Advanced Reporting and Auditing

  • Automate enforcement of regulatory compliance with policy-based encryption 
  • Unify visibility and policy deployment with other Trend Micro products through integration with Trend Micro Control Manager
  • Leverages Receive detailed auditing and reporting by individual, organizational unit, and device
  • Assist compliance initiatives with audit trail for all administrative actions
  • Demonstrate compliance on demand with real-time auditing

 

Administrative Tools and Active Directory Integration

  • Provide remote one-time passwords across all endpoint client applications 
  • Leverage Active Directory and existing IT infrastructure for deployment and management 
  • Take the burden off IT staff by allowing users to change and reset passwords and accounts 
  • Gain access to recovery console in Windows and preboot

 

Pre-Boot Multi-Factor Authentication

  • Uses Gain flexible authentication, including fixed password, built-in multi-factor authentication, or integration with other authentication products 
  • Ensure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (wifi and hard wired) 
  • Enable policy update before authentication 
  • Trigger lockout feature in response to incorrect authentication attempts 
  • Configure actions on failed password attempt threshold 
  • Support multiple user and administrator accounts per device

 

Support for a Consumerized Environment

  • Provide management and visibility for Microsoft BitLocker encryption keys, especially useful for employee owned devices where corporate data needs to be protected 
  • Provide visibility and management of Apple FileVault encryption keys to enforce policies on Macintosh computers, and protect them in case of loss or theft

 

Key Benefits

  • Helps ensure privacy and compliance enforcement with policy-based encryption
  • Lowers TCO with simplified deployment, configuration, and management
  • Provides comprehensive data security for laptops, desktops, removable media, and mobile devices
  • Helps ensure robust security through certifications including FIPS 140-2 Level 2
  • Maintains compliance and protects your data without disrupting users with remote management 

* Microsoft Bitlocker and Apple FileVault support are included in Trend Micro Endpoint Encryption and Trend Micro Full Disk Encryption.

Expand data security— For complete End User Protection

Trend Micro Endpoint Encryption is an essential part of an enterprise data protection strategy. if you already have a Trend Micro threat protection suite, consider adding Trend Micro™ Enterprise Data Protection, which includes:

  • Trend Micro™ Endpoint Encryption
  • Trend Micro™ Email Encryption Gateway
  • Trend Micro™ Mobile Security
  • Trend Micro™ Integrated Data Loss Prevention
     

By combining threat and data protection in a flexible, centrally-managed suite, it lowers the cost and effort to deploy and manage while closing critical security gaps— for complete end user protection. Enterprise Data Protection is also included in our most comprehensive enterprise security suite: Trend Micro™ Enterprise Security and Data Protection 

System Requirements

Minimum recommended server requirements

  • Windows 2003, 2008, 2008 R2, 2012, 2012 R2
  • 2 GHz Dual Quad Core Core2 Intel™ Xeon Processors
  • 4 GB RAM
  • 40 GB hard disk space

  • Windows 7, 8, 8.1, 10
  • Windows Embedded POSReady 7
  • Intel Core 2 or compatible processor
  • 1 GB RAM
  • 30 GB hard disk with 20% free space
  • Windows 7,8,8.1, 10
  • Windows  Embedded POSReady 7
  • Intel Core 2 or compatible processor
  • 1 GB RAM
  • TPM 1.2 or higher
  • 30 GB hard disk with 20% free space
  • OS X 10.7, 10.8, 10.9, 10.10 
  • Intel Core 2 or compatible processor
  • 8 GB hard disk