Endpoint Encryption utilizes both
role-based and identity-based authentication to secure data. Correctly configuring
Endpoint Encryption groups ensures that data remains encrypted from unauthorized
users, thus preventing data loss risk from accidental information release or deliberate
sabotage.
Topics include: