Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • QuantaStor Reviews & Ratings
    6 Ratings
    Company Website
  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Files.com Reviews & Ratings
    239 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,066 Ratings
    Company Website
  • Venn Reviews & Ratings
    27 Ratings
    Company Website

What is Trend Micro Endpoint Encryption?

Trend Micro™ Endpoint Encryption provides robust data protection across a range of devices such as laptops, desktops, PCs, Macs, USB drives, and other portable storage solutions. As a standalone agent, this service offers extensive encryption options for full disks, individual files or folders, and removable media, effectively preventing unauthorized access to sensitive data. Users benefit from a centralized management console that allows seamless oversight of their security requirements while utilizing the same interface for both endpoint protection and additional Trend Micro security products. By deploying the Endpoint Encryption agent, organizations not only enhance their data security but also remain agile in meeting the changing demands of mobile computing. This adaptability guarantees continuous protection as technological advancements and user needs evolve over time, ensuring that your data remains secure in a dynamic environment.

What is Atakama?

Atakama offers an innovative solution for information security, effectively shielding business data from a range of cyber threats, particularly in scenarios where other protective measures may prove inadequate. This platform is designed with customized security policies that cater to the unique requirements and operational workflows of your organization. The protection of sensitive information is crucial, encompassing defenses against both external attacks and internal vulnerabilities. Atakama facilitates the secure handling of critical materials, such as financial documents, personally identifiable information (PII), HR records, merger and acquisition contracts, research findings, internal correspondence, investment plans, and numerous other essential files. The increasing demand for encryption at the individual file level is being propelled by more stringent cybersecurity regulations at both state and federal levels. Additionally, the looming threat of ransomware attacks, which can involve both data theft and public exposure, presents a serious challenge for organizations. Atakama addresses this concern by ensuring that files are encrypted on the client side, meaning only encrypted versions are stored in the cloud or on servers, thereby adding a robust layer of defense against potential breaches. This dedication to file-level encryption not only fortifies data security but also aids organizations in adhering to ever-evolving regulatory standards. With cyber threats continuing to evolve, Atakama's proactive approach to data protection positions businesses to better manage their security risks.

Media

Media

Integrations Supported

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

Integrations Supported

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trend Micro

Date Founded

1988

Company Location

United States

Company Website

www.trendmicro.com

Company Facts

Organization Name

Atakama

Date Founded

2014

Company Location

United States

Company Website

www.atakama.com

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Popular Alternatives

Popular Alternatives

iSecurity Field Encryption Reviews & Ratings

iSecurity Field Encryption

Raz-Lee Security
BestCrypt Reviews & Ratings

BestCrypt

Jetico