Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    An easy-to-use, standalone encryption solution offers comprehensive remote management of endpoint encryption keys and security policies for data stored on hard drives, portable devices, and emails. Utilizing patented technology, it safeguards data for organizations of any size. ESET Endpoint Encryption is validated under FIPS 140-2 standards and employs 256-bit AES encryption. This system does not necessitate a server for installation and efficiently accommodates remote users. It allows for the management of encryption across Windows machines and integrates with native macOS encryption (FileVault) all through a unified dashboard. With ESET Endpoint Encryption, businesses gain enhanced capabilities to secure specific files, folders, virtual disks, or archives. By encrypting emails along with their attachments and limiting access to removable media for designated users, organizations can ensure data protection during transit and mitigate the risk of data breaches. Additionally, administrators maintain complete oversight of licensing, software functionalities, security policies, and encryption keys from a specialized ESET Endpoint Encryption console, offering a robust framework for data security management.
                
            
        
            Description
                    Your workforce depends on mobility and the ability to access information from anywhere to maintain their productivity. However, this convenience can inadvertently expose your sensitive data to risks, especially if devices are lost or stolen, leading to potential synchronization from the cloud. To safeguard this vital information and adhere to regulatory standards, Symantec Endpoint Encryption offers robust protection by encrypting every file on the hard drive, employing a sector-by-sector method for enhanced security. The solution is versatile, compatible with Windows, Mac, tablets, self-encrypting drives, as well as removable media like USB drives, external hard drives, and DVDs. Additionally, Symantec Endpoint Encryption provides management capabilities for devices protected by BitLocker and File Vault, ensuring maximum flexibility. On the communication front, Symantec Gateway Email Encryption facilitates secure, centrally-managed interactions with clients and partners right at the network gateway, effectively reducing the risk of data breaches while maintaining compliance with regulations. For email communication on desktops, Symantec Desktop Email Encryption seamlessly encrypts and decrypts messages between internal users, enhancing overall security and efficiency in correspondence. This comprehensive approach to data protection not only fortifies security but also promotes trust in your organization's handling of sensitive information.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
ESET
Founded
1992
Country
Slovakia
Website
www.eset.com/int/business/solutions/identity-and-data-protection/
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cybersecurity/endpoint/end-user
Product Features
Encryption
                                        Central Policy Enforcement
                                        
                                    
                                    
                                    
                                        Drag & Drop UI
                                        
                                    
                                    
                                    
                                        Email Encryption
                                        
                                    
                                    
                                    
                                        Encryption Key Management
                                        
                                    
                                    
                                    
                                        Endpoint Encryption
                                        
                                    
                                    
                                    
                                        File Compression
                                        
                                    
                                    
                                    
                                        File Encryption
                                        
                                    
                                    
                                    
                                        Full Disk Encryption
                                        
                                    
                                    
                                    
                                        Public Key Cryptography
                                        
                                    
                                    
                                    
                                        Tokenization / Data Masking
                                        
                                    
                            
                        Product Features
Encryption
                                        Central Policy Enforcement
                                        
                                    
                                    
                                    
                                        Drag & Drop UI
                                        
                                    
                                    
                                    
                                        Email Encryption
                                        
                                    
                                    
                                    
                                        Encryption Key Management
                                        
                                    
                                    
                                    
                                        Endpoint Encryption
                                        
                                    
                                    
                                    
                                        File Compression
                                        
                                    
                                    
                                    
                                        File Encryption
                                        
                                    
                                    
                                    
                                        Full Disk Encryption
                                        
                                    
                                    
                                    
                                        Public Key Cryptography
                                        
                                    
                                    
                                    
                                        Tokenization / Data Masking