ESET Endpoint Encryption - Enterprise Server
Simple and powerful encryption for organizations of all sizes
Manage users and workstations together or independently with the Endpoint Encryption Enterprise server.
The Enterprise Server can manage users and workstations together or independently. Activation, and changes to security policy, software feature-set, encryption keys and endpoint status are all handled securely through the cloud, keeping your most high-risk endpoints under close control at all times.
Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.
Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.
Why Endpoint Encryption?
Data Breaches
Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff
and HR information.
By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.
Remote Employees
Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.
Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.
Compliance
When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and
mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.
Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features
NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.
FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.
ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.
OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.
CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.
GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.
PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.
Data encryption for files on hard drives, portable devices and sent via email
• Simple and powerful encryption for organizations of all sizes
• Safely encrypt hard drives, removable media, files and email
• FIPS 140-2 Validated 256 bit AES encryption for assured security
• Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
• Also supports Microsoft Windows 10 including UEFI and GPT
How our encryption can help your business
• Meet data security obligations by easily enforcing encryption policies while keeping productivity high.
• Companies large and small benefit with low help-desk overhead and short deployment cycles.
• No other product can match ESET Endpoint Encryption for flexibility and ease of use.
• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.
• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.
Manage devicces anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.
Unique encryption key system
Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.
User-proof removable media
Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.
Remotely disable devices
More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.
Full specification and details can be found in the Product Datasheet PDF file
License: |
ESET Endpoint Encryption - Enterprise Server
Simple and powerful encryption for organizations of all sizes
A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:
Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.
Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.
Why Endpoint Encryption?
Data Breaches
Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff
and HR information.
By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.
Remote Employees
Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.
Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.
Compliance
When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and
mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.
Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features
NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.
FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.
ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.
OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.
CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.
GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.
PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.
Data encryption for files on hard drives, portable devices and sent via email
• Simple and powerful encryption for organizations of all sizes
• Safely encrypt hard drives, removable media, files and email
• FIPS 140-2 Validated 256 bit AES encryption for assured security
• Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
• Also supports Microsoft Windows 10 including UEFI and GPT
How our encryption can help your business
• Meet data security obligations by easily enforcing encryption policies while keeping productivity high.
• Companies large and small benefit with low help-desk overhead and short deployment cycles.
• No other product can match ESET Endpoint Encryption for flexibility and ease of use.
• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.
• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.
Manage devicces anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.
Unique encryption key system
Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.
User-proof removable media
Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.
Remotely disable devices
More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.
Desktop
License: |
ESET Endpoint Encryption - Enterprise Server
Simple and powerful encryption for organizations of all sizes
A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:
Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.
Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.
Why Endpoint Encryption?
Data Breaches
Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff
and HR information.
By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.
Remote Employees
Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.
Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.
Compliance
When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and
mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.
Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features
NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.
FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.
ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.
OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.
CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.
GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.
PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.
Data encryption for files on hard drives, portable devices and sent via email
• Simple and powerful encryption for organizations of all sizes
• Safely encrypt hard drives, removable media, files and email
• FIPS 140-2 Validated 256 bit AES encryption for assured security
• Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
• Also supports Microsoft Windows 10 including UEFI and GPT
How our encryption can help your business
• Meet data security obligations by easily enforcing encryption policies while keeping productivity high.
• Companies large and small benefit with low help-desk overhead and short deployment cycles.
• No other product can match ESET Endpoint Encryption for flexibility and ease of use.
• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.
• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.
Manage devicces anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.
Unique encryption key system
Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.
User-proof removable media
Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.
Remotely disable devices
More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.
Desktop
Essential Edition
Standard Edition
Pro
Full Disk Encryption
?
Removable Media Encryption
?
?
“Go” Portable Encryption
?
?
File & Folder Encryption
?
?
?
Email Encryption
?
?
?
Text & Clipboard Encryption
?
?
?
Virtual Disks & Encrypted Archives
?
?
?
Centralised Management Compatible
?
?
?
Full specification and details can be found in the Product Datasheet PDF file
License: |
ESET Endpoint Encryption - Enterprise Server
Simple and powerful encryption for organizations of all sizes
A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:
Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.
Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.
Why Endpoint Encryption?
Data Breaches
Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff
and HR information.
By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.
Remote Employees
Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.
Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.
Compliance
When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and
mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.
Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features
NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.
FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.
ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.
OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.
CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.
GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.
PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.
Data encryption for files on hard drives, portable devices and sent via email
• Simple and powerful encryption for organizations of all sizes
• Safely encrypt hard drives, removable media, files and email
• FIPS 140-2 Validated 256 bit AES encryption for assured security
• Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
• Also supports Microsoft Windows 10 including UEFI and GPT
How our encryption can help your business
• Meet data security obligations by easily enforcing encryption policies while keeping productivity high.
• Companies large and small benefit with low help-desk overhead and short deployment cycles.
• No other product can match ESET Endpoint Encryption for flexibility and ease of use.
• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.
• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.
Manage devicces anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.
Unique encryption key system
Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.
User-proof removable media
Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.
Remotely disable devices
More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.
Desktop
Essential Edition
Standard Edition
Pro
Full Disk Encryption
✔
Removable Media Encryption
✔
✔
“Go” Portable Encryption
✔
✔
File & Folder Encryption
✔
✔
✔
Email Encryption
✔
✔
✔
Text & Clipboard Encryption
✔
✔
✔
Virtual Disks & Encrypted Archives
✔
✔
✔
Centralised Management Compatible
✔
✔
✔
Full specification and details can be found in the Product Datasheet PDF file
License: |
ESET Endpoint Encryption - Enterprise Server
Simple and powerful encryption for organizations of all sizes
Mobile Edition includes: File & folder encryption, Outlook plugin for email & attachments, Text & clipboard encryption, Virtual disks & encrypted archives & Centralised management compatible
A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:
Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.
ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.
Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.
Why Endpoint Encryption?
Data Breaches
Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff
and HR information.
By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.
Remote Employees
Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.
Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.
Compliance
When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and
mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.
Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.
ESET Endpoint Encryption technical features
ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features
NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.
FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.
ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.
ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.
TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.
OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.
VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.
CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.
NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.
CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.
GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.
PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.
Data encryption for files on hard drives, portable devices and sent via email
• Simple and powerful encryption for organizations of all sizes
• Safely encrypt hard drives, removable media, files and email
• FIPS 140-2 Validated 256 bit AES encryption for assured security
• Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
• Also supports Microsoft Windows 10 including UEFI and GPT
How our encryption can help your business
• Meet data security obligations by easily enforcing encryption policies while keeping productivity high.
• Companies large and small benefit with low help-desk overhead and short deployment cycles.
• No other product can match ESET Endpoint Encryption for flexibility and ease of use.
• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.
• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.
Manage devicces anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.
Unique encryption key system
Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.
User-proof removable media
Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.
Remotely disable devices
More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.
Full specification and details can be found in the Product Datasheet PDF file
License: |
- Review: The 10 Best Wireless Access Points
- Review: The Top 10 Best Ethernet Cables
- What Is An Ethernet Cable And What Does It Do?
- 10 Best CCTV Security IP Cameras For Home & Business
- Review: Best Powerline Adapters In The UK
- Celebrating 20 Years Of Comms Express!
- The Top 10 DrayTek Wireless Access Points
- Best Selling APC Products At Comms Express
- Review: Top 5 Best Performing APC Uninterruptible Power Supply Units (UPS)
- Review: Top 10 Best PDU’s