Trellix Data EncryptionTrellix
|
||||||
Related Products
|
||||||
About
Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
|
About
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports.
Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location.
Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies wanting to stop struggling with scattered API keys, hacking together home-brewed configuration tools and avoiding access controls
|
Audience
IT teams searching for an advanced data encryption solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$6 per seat per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationDoppler
Founded: 2018
United States
www.doppler.com
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
||||||
|
||||||
Categories |
Categories |
|||||
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
||||||
Integrations
AD Enterprise
CircleCI
Compyl
Cyble
Dealer-FX
Entrust Identity Enterprise
GitLab
Google Cloud Platform
Heroku
Intellego XT
|
Integrations
AD Enterprise
CircleCI
Compyl
Cyble
Dealer-FX
Entrust Identity Enterprise
GitLab
Google Cloud Platform
Heroku
Intellego XT
|
|||||
|
|