BitLocker

BitLocker

Microsoft
+
+

Related Products

  • Proton Drive
    3,602 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • ESET PROTECT Advanced
    2,098 Ratings
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Proton Mail
    108,627 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,336 Ratings
    Visit Website
  • Files.com
    285 Ratings
    Visit Website
  • Satori
    86 Ratings
    Visit Website

About

BitLocker Drive Encryption is a data protection feature that integrates with the operating system and addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2 or later. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2 or later, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation. Starting with Windows 8, you can use an operating system volume password to protect the operating system volume on a computer without TPM.

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Anyone interested in a data protection software solution that integrates with the operating system

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.0 / 5
ease 5.0 / 5
features 4.0 / 5
design 4.0 / 5
support 4.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Microsoft
Founded: 1975
United States
docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

Alternatives

IceIT

IceIT

Quantum Knight, Inc

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
ConnectProtect Managed Detection and Response
Logsign
MaxPatrol
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
OctoXLabs
RapidScale Identity as a Service
SIRP

Integrations

Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Social Mining
ConnectProtect Managed Detection and Response
Logsign
MaxPatrol
Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
OctoXLabs
RapidScale Identity as a Service
SIRP
Claim BitLocker and update features and information
Claim BitLocker and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information