Users simply need a user key, group key, static one-time password, or smartcard certificate.
Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization.
Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen.Trend Micro™ Endpoint Encryption provides the data security you need with full disk encryption, folder and file encryption, and removable media encryption.This is highly recommended for Trend Micro customers with Maximum Security subscription. If you have downloaded and installed your program after that date, then you're probably using the latest version. To resolve this issue, refer to this Knowledge Base article for complete instructions:"Restart Required" message appears when installing updates for your Trend Micro Security software If the issue persists after restarting the components of your Trend Micro program, refer to this Knowledge Base article: "Protection Disabled" error message appears when opening the main console of your Trend Micro Security program.See how to check if you're running the latest version If you have the program installed prior to September 13, download and install the latest version for FREE. Having third-party security software or older Trend Micro programs installed on your computer may lead to installation and performance issues.A single console makes it easy to manage encryption keys and synchronize policy across all encryption components.
It also enforces secure authentication and provides the real-time auditing tools to ensure regulatory compliance.
Whatever the method, all devices are secured with a robust AES256 encryption algorithm.
There are many options for user authentication, including RSA Secure ID tokens.
And with devices that have network-aware pre-boot options, administrators can reset or “kill” a lost or stolen device before it re-boots.
The central management console has capabilities to recover lost data, update policies, and deploy new devices with ease.
Trend Micro™ endpoint encryption helps you prevent data theft and accidental data loss along with the compliance violations, reputation damage, and revenue loss.