Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with full disk encryption, folder and file encryption, and removable media encryption.
Trend Micro™ endpoint encryption helps you prevent data theft and accidental data loss along with the compliance violations, reputation damage, and revenue loss. Endpoint Encryption can be managed as a standalone solution or integrated with other Trend Micro products, such as OfficeScan and Control Manager.
A single console makes it easy to manage encryption keys and synchronize policy across all encryption components. It also enforces secure authentication and provides the real-time auditing tools to ensure regulatory compliance. Other data management features include user-based self-help options and remote device control. Trend Micro Control Manager can also be used to provide a unified management console with other Trend Micro products. The encryption client can also be deployed with Trend Micro OfficeScan endpoint security.
In the event a device is lost or stolen, full disk encryption ensures your data is unreadable. We offer a software- or hardware-based solution to fit your needs. For low startup costs, our software-based full disk encryption uses FIPS-140 certified and Common Criteria encryption with a network-aware pre-boot authentication. When automation and ease-of-use are a priority, our hardware-based full disk encryption deploys and manages self-encrypting drives using the OPAL and OPAL 2 standard.
Encrypt select files, folders, or external media by using a drag and drop, single-click capability. Users simply need a user key, group key, static one-time password, or smartcard certificate. Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization.
Allow administrators to enforce policy and protect data that is copied to removable media such as USB drives, CDs and DVDs. From the centralized policy console, encryption can be enforced or made optional for users writing to these devices.
Trend Micro Endpoint Encryption can manage Microsoft BitLocker and Apple FileVault which are encryption products delivered within the operating systems. Now corporate policy and control can be applied to those devices without the need to install an encryption agent.
In the event you lose a device, compliance mandates may require you to prove the device was encrypted. Trend Micro Endpoint Encryption’s advanced management console offers real-time status reports, including the last time a particular device was connected to your network. And with devices that have network-aware pre-boot options, administrators can reset or “kill” a lost or stolen device before it re-boots. The central management console has capabilities to recover lost data, update policies, and deploy new devices with ease.
Trend Micro Endpoint Encryption is available in a variety of platform options. Full disk encryption can be deployed as a software solution or OPAL and OPAL 2 compliant self-encrypting drives. Whatever the method, all devices are secured with a robust AES256 encryption algorithm. There are many options for user authentication, including RSA SecureID tokens.
Choose between managing encryption keys available through OS vendors such as Microsoft BitLocker or Macintosh FileVault. Or deploy Trend Micro's advanced encryption agent to your devices.
Industry mandates and legislation often describe how devices should be encrypted and require detailed product certifications. Trend Micro encryption products are covered by the most stringent and up-to-date standards, such as FIPS-140-2/3, Common Criteria, and NSTISSP to name a few.
Reduce your cost of ownership through integration with other Trend Micro management tools and innovative deployment capabilities that let you easily deploy without disrupting users. Once deployed, the automated reporting, auditing, and policy updating means that administering encrypted devices is easy. An optional end-user self-service portal for password administrationfurther reduces IT management.