This
chapter explains how
Endpoint Encryption protects user identity and
endpoint access. Correctly configuring
Endpoint Encryption users,
policy groups, and devices ensures that data remains encrypted from unauthorized users,
thus
preventing data loss risk from accidental information release or deliberate sabotage.
Topics include: