![]() ![]() Provide management and visibility for Microsoft ® BitLocker ®, this is especially useful for employee-owned devices where corporate data needs to be protected.Support multiple user and administrator accounts per device.Configure actions on failed password attempt threshold.Trigger the lockout feature in response to incorrect authentication attempts.Enable policy updates prior to authentication.Ensure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (WiFi and ethernet).Gain flexible authentication, including active directory integration, fixed password, and multi-factor authentication for government and defense customers.Gain access to recovery console in the Microsoft ® Windows ® pre-boot.Manage users and groups from multiple active directory domains in a single console, simplifying the existing IT infrastructure for deployment and management.Provide remote one-time passwords across all endpoint client applications.Demonstrate compliance on demand with real-time auditingĪdministrative Tools and Active Directory Integration.Assist compliance initiatives with an audit trail for all administrative actions.Receive detailed auditing and reporting by individual, organizational unit, and device.Automate enforcement of regulatory compliance with policy-based encryption.Unify visibility and policy deployment with other Trend Micro products through integration with Control Manager.Improve protection for remote devices with tools to remotely lock, reset, or “kill” lost or stolen devices-even before a device boots using network-aware pre-boot authentication. ![]() Collect device-specific information such as device attributes, directory listing, and unique device IDs based on device name, MAC address, and central processing unit (CPU) identifier.Manage policies and protect data on PCs, Macs, laptops, desktops, USBs, and removable media.Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password.Tight integration with Trend Micro™ Integrated Data Loss Prevention (iDLP) delivers content-based encryption for data at rest and in motion.Automate policy enforcement with remediation of security events, without the burden of encryption key management.Gain visibility and control over encryption, monitoring, and protection of data.Manage the encryption policy alongside all endpoint security policies with integration to a common management console, Trend Micro™ Control Manager™.Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption Lower Total Cost of Ownership (TCO) with Centralized Policy Administration and Transparent Key Management Enable automatic and transparent encryption without performance degradation.Simplify deployment and management with support for unified extensible firmware interface (UEFI), multiple physical drives, and pre-boot screen customization.Support self-encrypting TCG OPAL and OPAL 2 SED drives from Seagate, SanDisk ®, and Intel ®.Support and leverage flexible hardware and software-based encryption across mixed environments.Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption.Get comprehensive data protection on Macs and PC laptops, desktops, removable media, and mobile devices Maximize Platform Coverage for Data and Device Encryption Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. A single, well-integrated management console allows you to manage your users holistically-using the same console for endpoint protection and other Trend Micro security products. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Ensuring that sensitive data is secured in the case of device loss has never been more difficult. These challenges are further amplified as more and more employees bring their own computing devices to work. The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |