Trend
Micro™
Endpoint Encryption ensures privacy by encrypting data
stored on endpoints, files and folders, and removable media in a variety of platform
options.
Endpoint Encryption provides granular policy
controls and flexibly integrates with other
Trend Micro
management tools, including
Control Manager and
OfficeScan. Innovative deployment
capabilities help you easily deploy agent software using FIPS 140-2 hardware-based
or
software-based encryption that is fully transparent to end users, without disrupting
productivity. Once deployed, automated reporting, auditing, and policy synchronization
with
Endpoint Encryption PolicyServer simplifies endpoint
security management.
Endpoint Encryption has capabilities to deploy remote commands,
recover lost data, and protect user identity while maintaining real-time policy
synchronization. In the event that an endpoint is lost or stolen, remotely initiate
a
reset or kill
command to immediately protect corporate information. Many recovery
tools are also available to help end users rescue data from a corrupted hard disk.
Assimilating into existing corporate identity controls, Endpoint Encryption has a variety of authentication methods, including
Active Directory integration and resources for end users who have forgotten their
credentials.