Trend Micro Endpoint Encryption ensures privacy by encrypting data stored on
endpoints, files and folders, and removable media in a variety of platform options.
Endpoint Encryption provides granular policy controls and
flexibly integrates with other
Trend Micro management
tools, including
Control Manager and
OfficeScan. Innovative deployment capabilities help you
easily deploy agent software using FIPS 140-2 hardware-based or software-based
encryption that is fully transparent to end users, without disrupting productivity.
Once
deployed, automated reporting, auditing, and policy synchronization with
Endpoint Encryption
PolicyServer simplifies endpoint security management.
Endpoint Encryption has capabilities to deploy remote commands,
recover lost data, and protect user identity while maintaining real-time policy
synchronization. In the event that an endpoint is lost or stolen, remotely initiate
a
reset or kill
command to immediately protect corporate information. Many recovery
tools are also available to help end users rescue data from a corrupted hard disk.
Assimilating into existing corporate identity controls, Endpoint Encryption has a variety of authentication methods, including
Active Directory integration and resources for end users who have forgotten their
credentials.