Trend Micro Endpoint Encryption Description

Trend Micro™, Endpoint Encryption protects data on a variety of devices such as computers and laptops, desktops, USB drives and other removable media. This solution is available as a separate agent and combines enterprise-wide full disc, file/folder and removable media encryption to prevent unauthorized access or use of private information. You can manage all your users from one, integrated console. This console also allows you to use the same console for Trend Micro security products and endpoint protection. Endpoint encryption agents can be deployed to ensure your data is protected no matter what your mobile computing devices or organizational needs may change.

Integrations

API:
Yes, Trend Micro Endpoint Encryption has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Trend Micro
Year Founded:
1988
Headquarters:
United States
Website:
www.trendmicro.com

Media

Trend Micro Endpoint Encryption Screenshot 1
Recommended Products
Red Hat Enterprise Linux on Microsoft Azure Icon
Red Hat Enterprise Linux on Microsoft Azure

Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Learn More

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
Customer Support
Phone Support
24/7 Live Support
Online

Trend Micro Endpoint Encryption Features and Options

Encryption Software

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Trend Micro Endpoint Encryption User Reviews

Write a Review
  • Previous
  • Next