ESET Endpoint Encryption Pro

ESET Endpoint Encryption Pro

ESET Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should that data fall in the wrong hands. ESET Endpoint Encryption is a simple- to-use encryption for companies large and small, which supports full disk encryption (FDE), file/folder encryption, email encryption and USB encryption.

ESET Endpoint Encryption technical features

ENCRYPTION TYPES SUPPORTED

– Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features.

NO SERVER REQUIRED

– ESET Endpoint Security requires no server to utilize and can seamlessly support encryption for remote users.

FULLY VALIDATED

– ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption

ENCRYPT EMAIL & ATTACHMENTS

– Easily send and receive encrypted emails and attachments through Outlook.

ALGORITHMS & STANDARDS

– AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION

– Encrypt all or part of a text window—web- browsers, database memo-fields or web-mail.

OS SUPPORT

– Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

CENTRALIZED MANAGEMENT

– Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED

– TPM chips are optional but not required for using full disk encryption.

VIRTUAL DISKS & ENCRYPTED ARCHIVES

– Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

USE CASE

Businesses are in the news every single day notifying their customers that a data breach has occurred.

SOLUTION

Protect sensitive data with ESET Endpoint Encryption by means of full disk encryption (FDE).

Protect vulnerable communications such as Remote Desktop by adding multi-factor

Require multi-factor authentication in order to log in to devices that contain sensitive

USE CASE

Companies need the ability to protect sensitive data in the case of employee termination or when devices are lost or stolen.

SOLUTION

Restrict access to company resources by leveraging multi-factor

Utilize the remote lock-out functionality to protect devices that may be lost or

Leverage the ability to remove users from remote devices in order to protect data in the case of employee termination

The ESET difference

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

No special hardware required

TPM chips are optional but not required for using full disk encryption.

Multi-platform

Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

HOW DOES IT WORK

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up.

No firewall exclusions or open ports are required.

The encryption server can run on any Windows PC or server. All communication between the Encryption server and client

endpoints are encrypted with 256bit AES or RSA 1024 meaning that the Encryption server proxy only holds transient, encrypted

data packets with an anonymized index and no encryption keys.

Start using our service now !

Do you want to take advantage of our special offers? Please drop a message