Features and Benefits

The following table explains Endpoint Encryption key features and benefits.

Table 1. Endpoint Encryption Key Features




  • Protection for the full disk, including the master boot record (MBR), operating system, and all system files

  • Hardware-based and software-based encryption for mixed environments

  • Comprehensive data protection of files, folders, and removable media


  • Flexible authentication methods, including both single and multi-factor

  • Control password strength and regularity for password changes

  • Policy updates before authentication and system boot

  • Configurable actions on failed password attempt threshold

Device management

  • Policies to protect data on endpoints and removable media

  • Ability to remotely lock, reset, wipe, or kill a device

Central administration

  • Flexibly use either PolicyServer MMC or Control Manager to manage PolicyServer

  • Deploy Endpoint Encryption agents to endpoints already managed by OfficeScan

  • Enforce security policies to individual users and policy groups from a single policy server

  • Instantly protect end user data by sending lock or erase commands to lost or stolen Endpoint Encryption devices

  • Automate policy enforcement with remediation of security events

  • Update security policies in real-time, before authentication, to revoke user credentials before booting the operating system

Record keeping, reports, and auditing

  • Advanced real-time reporting and auditing to ensure security compliance

  • Analyze usage statistics with scheduled reports and alert notifications