Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Fabasoft Secomo represents a robust encryption framework that provides genuine end-to-end encryption, ensuring that the encryption process occurs directly on the workplace or mobile device rather than being handled in the cloud. This design guarantees that the communication remains secure from the sender to the recipient. Adhering to the principle of "Continuous protection through encryption," Fabasoft ensures that only you can access your Fabasoft Secomo and its configurations. Notably, Fabasoft does not have any interfaces to the device or your encryption keys. The system comprises Fabasoft Secomo software and two highly reliable servers within a network, equipped with hardware security modules that comply with FIPS 140-2 Level 4 standards for physical security. Additionally, Fabasoft Secomo allows for client certificate authentication, empowering you to determine who has the ability to access the security appliance and interact with encrypted documents. Designed for user-friendliness, Fabasoft Secomo also features its own dedicated management interface, making it easy to operate and manage. This comprehensive approach to encryption not only enhances security but also offers peace of mind for users handling sensitive information.
Description
Trellix offers Data Encryption solutions that protect devices and removable storage to guarantee that only authorized personnel can access the stored data. You can implement encryption policies from one management dashboard, which also allows for monitoring the encryption status and producing compliance documentation.
Select from a wide array of policy choices to safeguard data across various devices, files, and removable media, all efficiently overseen from a single platform.
With Trellix Native Drive Encryption, the management of both BitLocker and FileVault is centralized, streamlining operations into one accessible console that can be utilized on-premises or through SaaS. This approach not only conserves time but also optimizes resources for organizations dealing with various operating systems, as tasks such as encryption key and PIN management are consolidated in one place, enhancing overall efficiency. Additionally, this centralized system aids in maintaining a consistent security posture across the organization.
API Access
Has API
API Access
Has API
Integrations
A10 Defend DDoS Mitigator
AD Enterprise
AirShield
BeyondCorp Enterprise
Datacard Secura
Delta Lake
Entrust Certificate Hub
Entrust Identity Essentials
GoSecure
Intellego XT
Integrations
A10 Defend DDoS Mitigator
AD Enterprise
AirShield
BeyondCorp Enterprise
Datacard Secura
Delta Lake
Entrust Certificate Hub
Entrust Identity Essentials
GoSecure
Intellego XT
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Fabasoft
Founded
1988
Country
Austria
Website
www.fabasoft.com/en/products/fabasoft-secomo
Vendor Details
Company Name
Trellix
Founded
2022
Country
United States
Website
www.trellix.com/products/data-encryption/
Product Features
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking