Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    2,249 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,683 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    24 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Proton Mail Reviews & Ratings
    108,630 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • Files.com Reviews & Ratings
    309 Ratings
    Company Website
  • Proton Drive Reviews & Ratings
    3,602 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • MOVEit Reviews & Ratings
    621 Ratings
    Company Website

What is Trend Micro Endpoint Encryption?

Trend Microâ„¢ Endpoint Encryption provides robust data protection across a range of devices such as laptops, desktops, PCs, Macs, USB drives, and other portable storage solutions. As a standalone agent, this service offers extensive encryption options for full disks, individual files or folders, and removable media, effectively preventing unauthorized access to sensitive data. Users benefit from a centralized management console that allows seamless oversight of their security requirements while utilizing the same interface for both endpoint protection and additional Trend Micro security products. By deploying the Endpoint Encryption agent, organizations not only enhance their data security but also remain agile in meeting the changing demands of mobile computing. This adaptability guarantees continuous protection as technological advancements and user needs evolve over time, ensuring that your data remains secure in a dynamic environment.

What is ESET Endpoint Encryption?

A user-friendly, standalone encryption solution provides extensive remote control over endpoint encryption keys and security policies for data saved on hard drives, portable devices, and email communications. Employing patented technology, it ensures the safety of data for organizations regardless of their size. ESET Endpoint Encryption complies with FIPS 140-2 standards and utilizes 256-bit AES encryption for robust protection. The installation process is straightforward as it does not require a dedicated server, making it suitable for remote users. Moreover, it facilitates the management of encryption on Windows computers and seamlessly integrates with macOS’s native encryption solution, FileVault, all accessible through a centralized dashboard. With ESET Endpoint Encryption, companies can enhance their security by protecting specific files, folders, virtual disks, or archives. This solution also encrypts emails and their attachments, while controlling access to removable media for selected users, thereby securing data during transfer and reducing the likelihood of data leaks. Furthermore, administrators are empowered with complete management capabilities over licensing, software features, security protocols, and encryption keys from a dedicated ESET Endpoint Encryption console, providing a strong framework for comprehensive data security governance. Overall, this tool significantly strengthens an organization's ability to safeguard sensitive information across various platforms.

Media

Media

Integrations Supported

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

Integrations Supported

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
Comarch Wealth Management
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trend Micro

Date Founded

1988

Company Location

United States

Company Website

www.trendmicro.com

Company Facts

Organization Name

ESET

Date Founded

1992

Company Location

Slovakia

Company Website

www.eset.com/int/business/solutions/identity-and-data-protection/

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Popular Alternatives

Popular Alternatives

CLEAR Reviews & Ratings

CLEAR

Quantum Knight