logo

Contactu Us Form

     

    ESET Endpoint Encryption

    ESET Endpoint Encryption Pro

    ESET Endpoint encryption is an essential tool for data security, providing encryption of files and disks on the organization’s endpoint devices. This prevents the data from being readable and misused, should that data fall in the wrong hands. ESET Endpoint Encryption is a simple- to-use encryption for companies large and small, which supports full disk encryption (FDE), file/folder encryption, email encryption and USB encryption.

    ESET ENDPOINT ENCRYPTION TECHNICAL FEATURES

    ENCRYPTION TYPES SUPPORTED

    – Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features.

    NO SERVER REQUIRED

    – ESET Endpoint Security requires no server to utilize and can seamlessly support encryption for remote users.

    FULLY VALIDATED

    – ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption

    ENCRYPT EMAIL & ATTACHMENTS

    – Easily send and receive encrypted emails and attachments through Outlook.

    ALGORITHMS & STANDARDS

    – AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit.

    TEXT & CLIPBOARD ENCRYPTION

    – Encrypt all or part of a text window—web- browsers, database memo-fields or web-mail.

    OS SUPPORT

    – Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT, 7, Vista, XP SP 3; Microsoft Windows Server 2003-2012; Apple iOS.

    CENTRALIZED MANAGEMENT

    – Full control of licensing and software features, security policy and encryption keys.

    NO SPECIAL HARDWARE REQUIRED

    – TPM chips are optional but not required for using full disk encryption.

    VIRTUAL DISKS & ENCRYPTED ARCHIVES

    – Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.

    W3.CSS

    USE CASE

    Businesses are in the news every single day notifying their customers that a data breach has occurred.
    SOLUTION
    Protect sensitive data with ESET Endpoint Encryption by means of full disk encryption (FDE).
    Protect vulnerable communications such as Remote Desktop by adding multi-factor
    Require multi-factor authentication in order to log in to devices that contain sensitive

    The ESET difference

    No server required

    ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

    No server required

    ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

    No special hardware required

    TPM chips are optional but not required for using full disk encryption.

    Multi-platform

    Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

    The ESET difference

    The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up.

    No firewall exclusions or open ports are required.

    The encryption server can run on any Windows PC or server. All communication between the Encryption server and client

    endpoints are encrypted with 256bit AES or RSA 1024 meaning that the Encryption server proxy only holds transient, encrypted

    data packets with an anonymized index and no encryption keys.