Trellix Data EncryptionTrellix
|
||||||
Related Products
|
||||||
About
Creating and managing data policies is a slow pain. With PACE by STRM, you can make sure data is used securely. Apply data policies through code, wherever it lives. Farewell to long waits and costly meetings, meet your new open source data security engine. Data policies aren't just about controlling access; they are about extracting value from data with the right guardrails. PACE lets you collaborate on the why and when automating the how through code. With PACE you can programmatically define and apply data policies across platforms. Integrated into your data platform and catalog (optional), and by leveraging the native capabilities of the stack you already have. PACE enables automated policy application across key data platforms and catalogs to ease your governance processes. Ease the process of policy creation and implementation, centralize control, and decentralize execution. Fulfill auditing obligations by simply showing how controls are implemented.
|
About
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports.
Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location.
Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations in search of a tool to programatically create and apply data policy to processing platforms
|
Audience
IT teams searching for an advanced data encryption solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
Free
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSTRM
Netherlands
getstrm.com
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
||||||
Integrations
AD Enterprise
AD Lab
Azure Databricks
Azure Synapse Analytics
Centreon
Cyble
Cyware
Datacard Secura
Entrust Identity Essentials
GoSecure
|
Integrations
AD Enterprise
AD Lab
Azure Databricks
Azure Synapse Analytics
Centreon
Cyble
Cyware
Datacard Secura
Entrust Identity Essentials
GoSecure
|
|||||
|
|
|