With the growing number of data breaches and the increased penalties associated with them, the need for an enterprise-wide solution for data encryption is essential. However, according to a survey by Thales eSecurity and the Ponemon Institute, only 43% of organizations have an encryption strategy that is consistently applied throughout the enterprise. Trend Micro’s Endpoint Encryption is an option for an organization seeking a comprehensive endpoint encryption solution.
What Is Trend Micro Endpoint Encryption?
Trend Micro’s Endpoint Encryption is a data encryption solution for computers and removable media. It offers encryption at the full-disk, file and folder levels as well as providing support for encryption removable media like USB drives, CDs and DVDs.
Endpoint Encryption has a variety of useful features. Some of the key features include:
- Built-in auditing and reporting
- Enterprise-scale administrative tools
- Authentication configurability
- Support for built-in encryption products
Trend Micro has designed Endpoint Encryption to be an all-in-one solution for an organization’s data encryption needs. It includes a variety of functionality covering everything from configuration to auditing and reporting. In this section, we will explore some of the key features of the Endpoint Encryption solution.
Built-In Auditing and Reporting
One of the primary reasons for deploying a full-disk encryption solution is to ensure adequate protection of sensitive data in accordance with the appropriate laws and regulations. Trend Micro’s Endpoint Encryption solution provides automated enforcement of regulatory compliance including the ability to generate reports at an individual, department, or device level. To aid in demonstrating regulatory compliance, Endpoint Encryption can generate an audit trail for administrative actions and enables live auditing to demonstrate compliance on-demand.
Enterprise-Scale Administrative Tools
Trend Micro’s Endpoint Encryption integrates with Microsoft’s Active Directory to facilitate management of devices over multiple AD domains. It also enables the administrator to distribute single-use passwords to (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Howard Poston. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/0ZU-3wn_yok/