Key Features and Benefits Parent topic

The following table explains Endpoint Encryption key features and benefits.

Endpoint Encryption Key Features

Feature
Benefits
Encryption
  • Protection for the full disk, including the master boot record (MBR), operating system, and all system files
  • Hardware-based and software-based encryption for mixed environments
  • Comprehensive data protection of files, folders, and removable media
Authentication
  • Flexible authentication methods, including both single and multi-factor
  • Control password strength and regularity for password changes
  • Policy updates before authentication and system boot
  • Configurable actions on failed password attempt threshold
Device management
  • Policies to protect data on endpoints and removable media
  • Ability to remotely lock, reset, wipe, or kill a device
Central administration
  • Flexibly use either PolicyServer MMC or Control Manager to manage PolicyServer
  • Deploy Endpoint Encryption agents to endpoints already managed by OfficeScan
  • Enforce security policies to individual users and policy groups from a single policy server
  • Instantly protect end user data by sending lock or erase commands to lost or stolen Endpoint Encryption devices
  • Automate policy enforcement with remediation of security events
  • Update security policies in real-time, before authentication, to revoke user credentials before booting the operating system
Record keeping, reports, and auditing
  • Advanced real-time reporting and auditing to ensure security compliance
  • Analyze usage statistics with scheduled reports and alert notifications