ESET Endpoint Encryption Pro
ESET Endpoint Encryption Pro
ESET Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should that data fall in the wrong hands. ESET Endpoint Encryption is a simple- to-use encryption for companies large and small, which supports full disk encryption (FDE), file/folder encryption, email encryption and USB encryption.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
– Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features.
NO SERVER REQUIRED
– ESET Endpoint Security requires no server to utilize and can seamlessly support encryption for remote users.
FULLY VALIDATED
– ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption
ENCRYPT EMAIL & ATTACHMENTS
– Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
– AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
– Encrypt all or part of a text window—web- browsers, database memo-fields or web-mail.
OS SUPPORT
– Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
CENTRALIZED MANAGEMENT
– Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
– TPM chips are optional but not required for using full disk encryption.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
– Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
USE CASE
Businesses are in the news every single day notifying their customers that a data breach has occurred.
SOLUTION
Protect sensitive data with ESET Endpoint Encryption by means of full disk encryption (FDE).
Protect vulnerable communications such as Remote Desktop by adding multi-factor
Require multi-factor authentication in order to log in to devices that contain sensitive
USE CASE
Companies need the ability to protect sensitive data in the case of employee termination or when devices are lost or stolen.
SOLUTION
Restrict access to company resources by leveraging multi-factor
Utilize the remote lock-out functionality to protect devices that may be lost or
Leverage the ability to remove users from remote devices in order to protect data in the case of employee termination
The ESET difference
No server required
ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.
No server required
ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.
No special hardware required
TPM chips are optional but not required for using full disk encryption.
Multi-platform
Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.
HOW DOES IT WORK

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up.
No firewall exclusions or open ports are required.
The encryption server can run on any Windows PC or server. All communication between the Encryption server and client
endpoints are encrypted with 256bit AES or RSA 1024 meaning that the Encryption server proxy only holds transient, encrypted
data packets with an anonymized index and no encryption keys.
Start using our service now !
Do you want to take advantage of our special offers? Please drop a message