/
Page 1 of 3  •  DATASHEET  ENDPOINT ENCRYPTION Page 1 of 3  •  DATASHEET  ENDPOINT ENCRYPTION

Page 1 of 3 • DATASHEET ENDPOINT ENCRYPTION - PDF document

alexa-scheidler
alexa-scheidler . @alexa-scheidler
Follow
395 views
Uploaded On 2016-03-21

Page 1 of 3 • DATASHEET ENDPOINT ENCRYPTION - PPT Presentation

The proliferation of data and devices in today146s enterprises has increased the complexity of protecting condential data meeting compliance mandates and preventing costly data breaches These c ID: 263801

The proliferation data and

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "Page 1 of 3 • DATASHEET ENDPOI..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Page 1 of 3 • DATASHEET ENDPOINT ENCRYPTION The proliferation of data and devices in today’s enterprises has increased the complexity of protecting condential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplied as more and more employees bring their own computing devices to work in the name of productivity. Ensuring that sensitive data is secured in the case of device loss has never been more difcult. rend Microndpoint ncryption encrypts data on a wide range of devicesMacintosh laptops, desktops, CDs, DVDs, USB drives, and any other removable media. This FTWADWArotection DATASHEET Page 2 of 3 • DATASHEET ENDPOINT ENCRYPTION Advanced eporting and AuditingAutomate enforcement of regulatory compliance with policy-based encryptionUnify visibility and policy deployment with other Trend Micro products through integrationwith Trend Micro Control Managereceive detailed auditing and reporting by individual, organizational unit, and deviceAssist compliance initiatives with audit trail for all administrative actionsDemonstrate compliance on demand with real-time auditingAdministrative Active irectory ntegrationProvide remote one-time passwords across all endpoint client applicationsLeverage Active Directory and existing T infrastructure for deployment and managementTake the burden off T staff by allowing users to change and reset passwords and accountsGain access to recovery console in Windows and prebootre-Boot Multi-Factor AuthenticationGain exible authentication, including xed password, built-in multi-factor authentication, or integration with other authentication productsEnsure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (wi and hard wired)Enable policy update before authenticationTrigger lockout feature in response to incorrect authentication attemptsCongure actions on failed password attempt thresholdSupport multiple user and administrator accounts per deviceSupport for a onsumerized nvironmentProvide management and visibility for Microsoft BitLocker encryption keys, especiallyuseful for employee owned devices where corporate data needs to be protectedProvide visibility and management of Apple FileVault encryption keys to enforce policies on Macintosh computers, and protect them in case of loss or theftFEATUESMicrosoft Bitlocker and Apple FileVault support are included in Trend Micro Endpoint Encryption and Trend Micro Full Disk Encryption. ey BenetsHelps ensure privacy and compliance enforcement with policy-based encryptionLowers TC with simplied deployment, conguration, and managementProvides comprehensive data security for laptops, desktops, removable media, and mobile devicesHelps ensure robust security through certications including FPS 140-2 Level 2Maintains compliance and protects your data without disrupting users with remote management N-BORD KEY ME-WIDE NCRYPTIONMicrosoft BitLocker upport*pple FileVault ncryption upport*rend Micro ndpoint ncryptionrend Micro Full ncryptionrend Micro ncryptionCentralized policy and key management 140 encryption certicationLevel 2Level 1Level 2Level 2Level 2AES 256-bit encryptionAES 256XTS-AES 128AES 256AES 256AES 256File and folder encryptionRemovable media (CB) encryptionGranular port and device controlelf-encrypting drive managementFull disk encryptionNetwork-aware pre-boot authentication Page 3 of 3 • DATASHEET ENDPOINT ENCRYPTION Policy erverWindows 2003, 2008, 2008 2, 2012, 2012 2 GHz Dual Quad Core Core2 ntel Xeon Processors40 GB hard disk spaceFull ncryptionWindows XP, Vista, 7, 8, 8.1, 10Windows Embedded Peady 7ntel Core 2 or compatible processor30 GB hard disk with 20% free spaceBitLockerWindows 7, 8, 8.1, 10Windows Embedded Peady 7ntel Core 2 or compatible processor30 GB hard disk with 20% free spaceFileVaultS X 10.7, 10.8, 10.9, 10.10ntel Core 2 or compatible processor8 GB hard disk ©2015 by Trend Micro ncorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection etwork are trademarks or registered trademarks of Trend Micro ncorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. nformation contained in this document is subject to change without notice. [DS07_EndpointEncryption_ET_150908US]Securing our Journey to the EXPAD DATA SECUROTECTTrend Micro Endpoint Encryption is an essential part of an enterprise data protection strategy. f you already have a Trend Micro threat protection suite, consider adding Trend Micro Enterprise Data Protection, which includes:Trend Micro Endpoint EncryptionTrend Micro Email Encryption GatewayTrend Micro Mobile SecurityTrend Microntegrated Data Loss PreventionBy combining threat and data protection in a exible, centrally-managed suite, it lowers the cost and effort to deploy and manage while closing critical security gapsfor complete end user protection. Enterprise Data Protection is also included in our most comprehensive enterprise security suite: Trend Micro Enterprise Security and Data Protection