Overview
The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplified as more and more employees bring their own computing devices to work in the name of productivity. Ensuring that sensitive data is secured in the case of device loss has never been more difficult.
Trend Micro Endpoint Encryption encrypts data on a wide range of devices—PC and Macintosh laptops, desktops, CDs, DVDs, USB drives and any other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption with granular port and device control to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same interface for endpoint protection and other Trend security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Software & Hardware
Protection Points
- Laptops, desktops
- Removable media: CD/DVD/USB
- Files and file volumes (folders)
Threat Protection
- Privacy
- Data protection
- Regulatory Compliance
- Securing intellectual property
Advantages
Maximize Platform Coverage For Data & Device Encryption
Get comprehensive data protection on Macintosh and PC laptops, desktops, removable media, and mobile devices
- Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption
- Support and leverage flexible hardware and software-based encryption across mixed environments
- Support self-encrypting drives from Seagate and emerging TCG OPAL and OPAL 2 SED standard
- Enable automatic and transparent encryption without performance degradation
Lower Tco With Centralized Policy Administration & Key Management
Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption
- Gain visibility and control over encryption, monitoring and protection of data
- Manage encryption policy alongside all endpoint security policies with integration to Trend Micro’s common management console, Control Manager
- Simplify operations with a unified data repository with single management server and console
- Automate policy enforcement with remediation of security events
Simplify Remote Device Management
- Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password
- Manage policies and protect data on PCs, laptops, USBs, CDs, DVDs
- Identify a lost device before it boots so that appropriate policies can be applied using network-aware preboot authentication
- Collect device-specific information such as device attributes, directory listing, and unique device iDs based on device name, MAC address, and CPU identifier
- Improve protection for remote devices with tools to remotely lock, reset, or “kill” lost or stolen devices
Benefits
- Helps ensure privacy and compliance enforcement with policy-based encryption
- Lowers TCo with simplified deployment, configuration, and management
- Provides comprehensive data security for laptops, desktops, removable media, and mobile devices
- Helps ensure robust security through certifications including FiPS 140-2 Level 2
- Maintains compliance and protect your data without disrupting users with remote management
Endpoint Encryption is a critical component of our Smart Protection Suites, which deliver even more data protection capabilities like data loss prevention (DLP) and device control but also gateway, mobile device, and endpoint with our XGen™ security-optimized threat protection capabilities like file reputation, machine learning, behavioral analysis, exploit protection, application control, and intrusion prevention (vulnerability protection). Additional Trend Micro solutions extend your protection from advanced attacks with endpoint investigation and detection. Plus, Trend Micro Deep Discovery network sandboxing delivers rapid response (real-time signature updates) to endpoints when a new threat is detected locally, enabling faster time-to-protection and reducing the spread of malware. All of this modern threat security technology is made simple for your organization with central visibility, management, and reporting.
|
Native Operating System (OS) Encryption Management |
Trend Micro Endpoint Encryption |
Centralized policy and key management |
|
|
|
|
FIPS 140-2 certification |
|
|
|
|
AES 256-bit encryption |
AES 256 |
AES 128 |
AES 128 & 256 |
AES 256 |
File and folder encryption |
|
|
|
|
Removable media (CD/DVD/USB) encryption |
|
|
|
|
Self-encrypting drive management |
|
|
|
|
Full disk encryption |
|
|
|
|
Network-aware pre-boot authentication |
|
|
|
|
* Management for Microsoft Bitlocker and Apple FileVault is included with Trend Micro Endpoint Encryption.