+
+

Related Products

  • Proton Drive
    3,602 Ratings
    Visit Website
  • Proton Mail
    108,625 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,052 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Files.com
    239 Ratings
    Visit Website
  • Satori
    86 Ratings
    Visit Website
  • QuantaStor
    6 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website

About

Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.

About

Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that want to afeguard data on computers, tablets, hard drives, removable media, email systems, and cloud-based applications

Audience

IT teams searching for an advanced data encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/cybersecurity/endpoint/end-user

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/

Alternatives

Alternatives

CylanceENDPOINT

CylanceENDPOINT

BlackBerry
Panda Full Encryption

Panda Full Encryption

WatchGuard Technologies
Folder Lock

Folder Lock

NewSoftwares.net

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

AD Enterprise
AD Lab
CA Auditor for z/OS
Centreon
Cyble
Cyware
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
GoSecure
Intellego XT
Ionic Machina
PassiveTotal
Recorded Future
SIRP
SOCRadar Extended Threat Intelligence
The Respond Analyst
ThreatQ
Trellix Endpoint Security (HX)
iSecurity Audit

Integrations

AD Enterprise
AD Lab
CA Auditor for z/OS
Centreon
Cyble
Cyware
Datacard Secura
Entrust Identity Enterprise
Entrust Identity Essentials
GoSecure
Intellego XT
Ionic Machina
PassiveTotal
Recorded Future
SIRP
SOCRadar Extended Threat Intelligence
The Respond Analyst
ThreatQ
Trellix Endpoint Security (HX)
iSecurity Audit
Claim Symantec Endpoint Encryption and update features and information
Claim Symantec Endpoint Encryption and update features and information
Claim Trellix Data Encryption and update features and information
Claim Trellix Data Encryption and update features and information