Apex One Endpoint Encryption Datasheet
Apex One Endpoint Encryption Datasheet
Trend Micro™
ENDPOINT ENCRYPTION
Data protection with encryption for desktops, laptops, and removable media
The proliferation of data and devices in today’s enterprises has increased the complexity SOFTWARE AND HARDWARE
of protecting confidential data, meeting compliance mandates, and preventing costly
Protection Points
data breaches. These challenges are further amplified as more and more employees
• Laptops, desktops
bring their own computing devices to work in the name of productivity. Ensuring that
• Removable media: USB/CD/DVD
sensitive data is secured in the case of device loss has never been more difficult.
• Files and file volumes (folders)
Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs Threat Protection
and Macs, laptops and desktops, USB drives, and other removable media. Available as a • Privacy
separate agent, this solution combines enterprise-wide full disk, file/folder, and removable • Data protection
media encryption to prevent unauthorized access and use of private information. A single, • Regulatory compliance
well-integrated management console allows you to manage your users holistically—using • Securing intellectual property
the same console for endpoint protection and other Trend Micro security products.
Deploying the Endpoint Encryption agent helps ensure that your data will continue to be
protected as your mobile computing devices and organizational needs change.
ADVANTAGES
Maximize Platform Coverage Lower Total Cost of Ownership (TCO) Simplify Remote Device Management
for Data and Device Encryption with Centralized Policy Administration • Maintain compliance and protect your data
and Transparent Key Management without disrupting users in the event of a
Get comprehensive data protection on Macs
lost device or forgotten password
and PC laptops, desktops, removable media, Save more with an integrated solution that
and mobile devices makes it easy to deploy, configure, and • Manage policies and protect data on
• Encrypt private data with fully integrated manage encryption PCs, Macs, laptops, desktops, USBs, and
full disk, file folder, USB, and removable • Manage the encryption policy alongside all removable media
media encryption endpoint security policies with integration • Collect device-specific information, such
• Support and leverage flexible hardware and to a common management console, as device attributes, directory listing,
software-based encryption across mixed Trend Micro™ Control Manager™ unique device IDs based on device name,
environments • Gain visibility and control over encryption, MAC address, and central processing unit
monitoring, and protection of data (CPU) identifier
• Support self-encrypting TCG OPAL and
OPAL 2 SED drives from Seagate, SanDisk, • Automate policy enforcement with • Improve protection for remote devices
and Intel remediation of security events, without the with tools to remotely lock, reset, or “kill”
burden of encryption key management lost or stolen devices—even before a
• Simplify deployment and management with device boots using network-aware
support for unified extensible firmware • Tight integration with Trend Micro™ pre-boot authentication
interface (UEFI), multiple physical drives, Integrated Data Loss Prevention (iDLP)
and pre-boot screen customization delivers content-based encryption for data
• Enable automatic and transparent at rest and in motion
encryption without performance
degradation
• Automate enforcement of regulatory and defense customers • Lowers TCO with simplified
deployment, configuration,
compliance with policy-based encryption • Ensure that lost or stolen devices can be and management
remotely wiped or locked before they can
• Receive detailed auditing and reporting by • Provides comprehensive data security
boot using network-aware (wi-fi and ethernet)
individual, organizational unit, and device for laptops, desktops, removable
• Assist compliance initiatives with an audit • Enable policy updates prior media, and mobile devices
to authentication • Helps ensure robust security through
trail for all administrative actions
• Trigger the lockout feature in response to certifications including the Federal
• Demonstrate compliance on demand with Information Processing Standard
incorrect authentication attempts
real-time auditing (FIPS) Publication 140-2 certification
• Configure actions on failed password • Maintains compliance and protects
attempt threshold your data without disrupting users with
Administrative Tools and
• Support multiple user and administrator remote management
Active Directory Integration
• Provide remote one-time passwords across accounts per device
all endpoint client applications
• Manage users and groups from multiple Support for a Consumerized
active directory domains in a single console, Environment
simplifying the existing IT infrastructure for • Provide and visibility for Microsoft
deployment and management BitLocker, this is especially useful for
employee-owned devices where corporate
• Gain access to the recovery console in
data needs to be protected
Microsoft Windows pre-boot
• Provide visibility and management of Apple
FileVault to enforce policies on Macs, and
protect them in the case of loss or theft
* Management for Bitlocker and FileVault is included with Trend Micro Endpoint Encryption (requires separate agent).
** Dependent on the OS version and machine model.
www.trendmicro.com