+
+

Related Products

  • Proton Drive
    3,602 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,936 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,305 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Files.com
    330 Ratings
    Visit Website
  • MOVEit
    622 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website

About

Your staff relies on mobility and anywhere-access to stay productive. Unfortunately, your sensitive data may be unknowingly synchronized from the cloud, and at risk when devices are lost or stolen. Symantec Endpoint Encryption protects sensitive information and ensures regulatory compliance. It encrypts all files on the hard drive, sector-by-sector, for maximum security. It supports Windows, Mac, tablets, self-encrypting drives, and removable media (USB drives, external hard drives, and DVDs). For maximum flexibility, Symantec Endpoint Encryption also manages BitLocker and File Vault-protected devices. Symantec Gateway Email Encryption provides centrally-managed, secure communications with customers and partners at the network gateway. It minimizes the risk of a data breach while ensuring regulatory compliance. For desktop applications, Symantec Desktop Email Encryption automatically encrypts and decrypts email directly between internal clients.

About

Virtual Safe Business Professional is business software that allows you and your employees to manage virtual, encrypted directories in your IT infrastructure. Master Data Management: The individual virtual safes can be flexibly expanded to include master data. Expand your safes with an item or customer number or a processing status, for example. Safe-Search: You or your employees can then use the integrated search function to filter according to your master data. Master-Password: Critical operations can be secured with a master password and, of course, all safes can be opened with it. Collaboration: When working in a team, it is important that the software supports you. Therefore the type of access can be selected by the user. The software also recognizes when a safe is already being processed. In this case, all employees can still read the safe data. Company standards are mapped and distributed to business areas via common configuration directories.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that want to afeguard data on computers, tablets, hard drives, removable media, email systems, and cloud-based applications

Audience

All users, companies and organizations, who are looking for a secure, simple and cross-team encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

€49/user
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.0 / 5
design 4.0 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Broadcom
Founded: 1991
United States
www.broadcom.com/products/cybersecurity/endpoint/end-user

Company Information

Marcel Scheitza
Founded: 2011
Germany
www.virtualsafepro.de/en/products-business.php

Alternatives

Alternatives

Concealer

Concealer

BeLight Software
SafeConsole

SafeConsole

DataLocker
BitLocker

BitLocker

Microsoft

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

Auditor for z/OS

Integrations

Auditor for z/OS
Claim Symantec Endpoint Encryption and update features and information
Claim Symantec Endpoint Encryption and update features and information
Claim Virtual Safe Business Professional and update features and information
Claim Virtual Safe Business Professional and update features and information