+
+

Related Products

  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • Proton Mail
    108,629 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Satori
    89 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • Files.com
    288 Ratings
    Visit Website

About

A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives. By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company. Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Users that need an encryption solution

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

ESET
Founded: 1992
Slovakia
www.eset.com/int/business/solutions/identity-and-data-protection/

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

CLEAR

CLEAR

Quantum Knight

Alternatives

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect

Integrations

A10 Defend DDoS Mitigator
Anitian FedRAMP Comprehensive
Atlantic.Net
Axonius
BIMA
Centreon
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Mobile Sales Force
Comarch Wealth Management
ConnectProtect Managed Detection and Response
Cybraics
Logsign
MaxPatrol
RapidScale Identity as a Service
SIRP
SaaShop
Trustwave DbProtect
Claim ESET Endpoint Encryption and update features and information
Claim ESET Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information