Call us FREE on 0800 488 000
X
X

Please Log In Below

Forgotten Password?
Retry
Login
loading Gif
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Remove all items from cart
Are you sure? Yes No
Learn more about how
to collect Data Points
for free gifts.
Comms Express Finance Options
Request A Quote
View Cart
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Browse Categories
Spend £100.00 for
FREE DELIVERY.
Free delivery excludes heavy and bulky products
ESET Logo

ESET Endpoint Encryption - Enterprise Server

Simple and powerful encryption for organizations of all sizes

Manage users and workstations together or independently with the Endpoint Encryption Enterprise server.

The Enterprise Server can manage users and workstations together or independently. Activation, and changes to security policy, software feature-set, encryption keys and endpoint status are all handled securely through the cloud, keeping your most high-risk endpoints under close control at all times.



Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.

ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.

Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.




Why Endpoint Encryption? Data Breaches Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff and HR information. By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff. Remote Employees Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users. Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network. Compliance When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented. Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.




ESET Endpoint Encryption technical features ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features

NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.

  FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.

ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.

  ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.

  OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

  CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.

  CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

  PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

 


Data encryption for files on hard drives, portable devices and sent via email • Simple and powerful encryption for organizations of all sizes • Safely encrypt hard drives, removable media, files and emailFIPS 140-2 Validated 256 bit AES encryption for assured security • Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy • Also supports Microsoft Windows 10 including UEFI and GPT




How our encryption can help your business • Meet data security obligations by easily enforcing encryption policies while keeping productivity high. • Companies large and small benefit with low help-desk overhead and short deployment cycles. • No other product can match ESET Endpoint Encryption for flexibility and ease of use. • The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package. • The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.




Manage devicces anywhere ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.




Zero impact on productivity The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.




Unique encryption key system Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.




User-proof removable media Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.




Remotely disable devices More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.


Full specification and details can be found in the Product Datasheet PDF file

Express View Logo
License:
In Stock: 1-3 Days
£120.40
£144.48 Inc Vat
Add To Cart
ESET Logo

ESET Endpoint Encryption - Enterprise Server

Simple and powerful encryption for organizations of all sizes

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:



Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.

ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.

Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.




Why Endpoint Encryption? Data Breaches Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff and HR information. By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff. Remote Employees Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users. Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network. Compliance When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented. Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.




ESET Endpoint Encryption technical features ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features

NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.

  FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.

ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.

  ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.

  OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

  CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.

  CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

  PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

 


Data encryption for files on hard drives, portable devices and sent via email • Simple and powerful encryption for organizations of all sizes • Safely encrypt hard drives, removable media, files and emailFIPS 140-2 Validated 256 bit AES encryption for assured security • Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy • Also supports Microsoft Windows 10 including UEFI and GPT




How our encryption can help your business • Meet data security obligations by easily enforcing encryption policies while keeping productivity high. • Companies large and small benefit with low help-desk overhead and short deployment cycles. • No other product can match ESET Endpoint Encryption for flexibility and ease of use. • The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package. • The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.




Manage devicces anywhere ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.




Zero impact on productivity The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.




Unique encryption key system Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.




User-proof removable media Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.




Remotely disable devices More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.


Desktop

Express View Logo
License:
In Stock: 1-3 Days
£7.10
£8.52 Inc Vat
Add To Cart
ESET Logo

ESET Endpoint Encryption - Enterprise Server

Simple and powerful encryption for organizations of all sizes

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:



Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.

ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.

Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.




Why Endpoint Encryption? Data Breaches

Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff and HR information.

By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff.

Remote Employees

Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users.

Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network.

Compliance

When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented.

Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.




ESET Endpoint Encryption technical features ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features

NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.

  FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.

ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.

  ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.

  OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

  CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.

  CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

  PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

 


Data encryption for files on hard drives, portable devices and sent via email • Simple and powerful encryption for organizations of all sizes

Safely encrypt hard drives, removable media, files and email

FIPS 140-2 Validated 256 bit AES encryption for assured security

Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy

Also supports Microsoft Windows 10 including UEFI and GPT




How our encryption can help your business • Meet data security obligations by easily enforcing encryption policies while keeping productivity high.

• Companies large and small benefit with low help-desk overhead and short deployment cycles.

• No other product can match ESET Endpoint Encryption for flexibility and ease of use.

• The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package.

• The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.




Manage devicces anywhere ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.




Zero impact on productivity The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.




Unique encryption key system Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.




User-proof removable media Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.




Remotely disable devices More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.


Desktop Essential Edition Standard Edition Pro Full Disk Encryption ? Removable Media Encryption ? ? “Go” Portable Encryption ? ? File & Folder Encryption ? ? ? Email Encryption ? ? ? Text & Clipboard Encryption ? ? ? Virtual Disks & Encrypted Archives ? ? ? Centralised Management Compatible ? ? ?
Full specification and details can be found in the Product Datasheet PDF file

Express View Logo
License:
In Stock: 1-3 Days
£39.40
£47.28 Inc Vat
Add To Cart
ESET Logo

ESET Endpoint Encryption - Enterprise Server

Simple and powerful encryption for organizations of all sizes

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:



Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.

ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.

Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.




Why Endpoint Encryption? Data Breaches Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff and HR information. By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff. Remote Employees Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users. Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network. Compliance When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented. Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.




ESET Endpoint Encryption technical features ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features

NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.

  FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.

ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.

  ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.

  OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

  CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.

  CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

  PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

 


Data encryption for files on hard drives, portable devices and sent via email • Simple and powerful encryption for organizations of all sizes • Safely encrypt hard drives, removable media, files and emailFIPS 140-2 Validated 256 bit AES encryption for assured security • Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy • Also supports Microsoft Windows 10 including UEFI and GPT




How our encryption can help your business • Meet data security obligations by easily enforcing encryption policies while keeping productivity high. • Companies large and small benefit with low help-desk overhead and short deployment cycles. • No other product can match ESET Endpoint Encryption for flexibility and ease of use. • The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package. • The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.




Manage devicces anywhere ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.




Zero impact on productivity The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.




Unique encryption key system Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.




User-proof removable media Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.




Remotely disable devices More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.


Desktop Essential Edition Standard Edition Pro Full Disk Encryption ✔ Removable Media Encryption ✔ ✔ “Go” Portable Encryption ✔ ✔ File & Folder Encryption ✔ ✔ Email Encryption ✔ ✔ Text & Clipboard Encryption ✔ ✔ Virtual Disks & Encrypted Archives ✔ ✔ Centralised Management Compatible ✔ ✔
Full specification and details can be found in the Product Datasheet PDF file

Express View Logo
License:
In Stock: 1-3 Days
£23.70
£28.44 Inc Vat
Add To Cart
ESET Logo

ESET Endpoint Encryption - Enterprise Server

Simple and powerful encryption for organizations of all sizes

Mobile Edition includes: File & folder encryption, Outlook plugin for email & attachments, Text & clipboard encryption, Virtual disks & encrypted archives & Centralised management compatible

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:



Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should they fall in the wrong hands.

ESET Endpoint Encryption is a simple-to-use encryption for companies large and small, which supports full disk encryption (FDE), file / folder encryption, email encryption and USB encryption.

Provides additional protection. Users can protect individual items like files, folders, removable media and email. With file and email encryption, user data are protected when data is in transit, allowing secure collaboration. You can also manage remote devices via a proxy, eliminating the need for risky incoming connections and making management of encryption safe and simple for businesses of all sizes.




Why Endpoint Encryption? Data Breaches Today’s cybersecurity landscape has an increasing number of data breaches happening every day. When these breaches occur if encryption is not implemented, then the data is at risk of being released to the public or utilized for malicious purposes. Some companies may choose to not care about the release of data, but all companies have sensitive data such as customer lists, proprietary information, sales-related data, staff and HR information. By implementing an encryption solution, businesses make it impossible for hackers to read the data that may have been stolen. The top industries for data breaches are traditionally ones that have valuable data such as financial, retail, healthcare and the public sector. However, that does not mean that other industries are safe—just that hackers typically weigh effort required versus the payoff. Remote Employees Remote employees or traveling users have become the norm of most businesses. Employees are now working out of coffee shops or, due to travel, working from airports. However, the more remote employees that you have the higher the risk of lost or stolen devices. Not only do businesses need to worry about simply lost or stolen devices, they need to think about the process of terminating remote users. Unlike with other products, with ESET Endpoint Encryption you can disable a remote employee’s laptop within seconds of their connection to the internet, without the need to wait for them to connect to the VPN or the corporate network. Compliance When it comes to compliance, most businesses first need to understand whether they have to meet a compliance or not. Next, they have to review what requirements the compliance recommends and mandates that their business implement. When it comes to encryption, many regulations and laws, such as GDPR, PCI-DSS, HIPAA, SOX and GLBA, require that it be implemented. Endpoint encryption is no longer an optional solution for most businesses that handle credit cards or health information, but rather a required solution. All businesses should do research and evaluate if they need to abide by certain compliances.




ESET Endpoint Encryption technical features ENCRYPTION TYPES SUPPORTED
Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features

NO SERVER REQUIRED
ESET Endpoint Encryption requires no server to utilize, and can seamlessly support encryption for remote users.

  FULLY VALIDATED
ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption.

ENCRYPT EMAIL & ATTACHMENTS
Easily send and receive encrypted emails and attachments through Outlook.

  ALGORITHMS & STANDARDS
AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

TEXT & CLIPBOARD ENCRYPTION
Encrypt all or part of a text window—web-browsers, database memo-fields or web-mail.

  OS SUPPORT
Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

VIRTUAL DISKS & ENCRYPTED ARCHIVES
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

  CENTRALIZED MANAGEMENT
Full control of licensing and software features, security policy and encryption keys.

NO SPECIAL HARDWARE REQUIRED
TPM chips are optional but not required for using full disk encryption.

  CROSS-PLATFORM COVERAGE
Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

GRANULAR DATA PROTECTION
ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

  PROTECT DATA IN TRANSIT
By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

 


Data encryption for files on hard drives, portable devices and sent via email • Simple and powerful encryption for organizations of all sizes • Safely encrypt hard drives, removable media, files and emailFIPS 140-2 Validated 256 bit AES encryption for assured security • Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy • Also supports Microsoft Windows 10 including UEFI and GPT




How our encryption can help your business • Meet data security obligations by easily enforcing encryption policies while keeping productivity high. • Companies large and small benefit with low help-desk overhead and short deployment cycles. • No other product can match ESET Endpoint Encryption for flexibility and ease of use. • The client side requires minimal user interaction, improving compliance and the security of your company data from a single MSI package. • The server side makes it easy to manage users and workstations and extend the protection of your company beyond the perimeter of your network.




Manage devicces anywhere ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity via a proxy. This eliminates the need for risky incoming connections, making management of encryption safe and simple for businesses of all sizes. All client and server connections are SSL encrypted and all commands and data are endto-end AES or RSA encrypted.




Zero impact on productivity The implementation of encryption is completely transparent for the users and requires no action on their part, increasing their compliance. No extra overhead is created for either IT departments or users, and there’s no need for user training.




Unique encryption key system Using centrally managed, shared encryption keys avoids problems encountered by encryption solutions, which typically use either shared passwords or public keys. The system used by ESET Endpoint Encryption mirrors the way that physical keys are used to lock our houses, apartments, cars, etc. Staff already understand this concept, and it only needs explaining once. Coupled with a premium remote-management system, shared encryption keys are both highly secure and practical.




User-proof removable media Management of removable media devices in a secure environment can sometimes be a hassle. ESET Endpoint Encryption protects drives of all sizes in seconds, creating an encrypted space which grows and shrinks as required. This means that any writable device is safe to use, user-owned devices are not locked for their private use, and whitelisting is not necessary. In addition, no shared passwords are required, which keeps it extremely simple for end-users and trouble-free for administrators.




Remotely disable devices More companies are moving to a mobile workforce where employees not only work at airports or at home but also at coffee shops. Due to this, businesses need peace of mind and the ability to remotely disable or lock out devices in case the device is lost or stolen. ESET Endpoint Encryption provides a simple way to do this without the use of open, incoming Firewall ports, VPN access and critically, without any user interaction. If connected to a WiFi network, the laptop can have encryption keys wiped and be locked from the Windows login screen, with status reported back silently.


Full specification and details can be found in the Product Datasheet PDF file

Express View Logo
License:
In Stock: 1-3 Days
£2.80
£3.36 Inc Vat
Add To Cart
Other Ranges Available
ESET Desktop Licenses
View Range
ESET Windows Licenses
View Range
ESET Mail Licenses
View Range
ESET Protect Licenses
View Range
Join Our Mailing List
Social Links
  • Apply for Credit