ESET Endpoint Encryption
Businesses are in the news every single day notifying their customers that a data breach has occurred.
An encryption application with full remote control of endpoint policy & shared encryption keys to protect data, meeting the compliance standards of GDPR regulations.
Manage devices anywhere
Zero impact on productivity
Fast, seamless deployment
Arrange to talk to us about encrypting your company data.
We are here to help keep your IT systems running smoothly and your data secure.
CALLBACK REQUEST
Arrange to talk to us about encrypting your company data.
Endpoint Encryption Variants
Mobile
- File & folder encryption
- Text & clipboard encryption
- Outlook plugin for email & attachments
- Centralised management compatible
- Virtual disks & encrypted archives
- Removable media encryption
- “Go” portable encryption
- Full disk encryption
Essential
- File & folder encryption
- Text & clipboard encryption
- Outlook plugin for email & attachments
- Centralised management compatible
- Virtual disks & encrypted archives
- Removable media encryption
- “Go” portable encryption
- Full disk encryption
Standard
- File & folder encryption
- Text & clipboard encryption
- Outlook plugin for email & attachments
- Centralised management compatible
- Virtual disks & encrypted archives
- Removable media encryption
- “Go” portable encryption
- Full disk encryption
Pro
- File & folder encryption
- Text & clipboard encryption
- Outlook plugin for email & attachments
- Centralised management compatible
- Virtual disks & encrypted archives
- Removable media encryption
- “Go” portable encryption
- Full disk encryption
Why use ESET Endpoint Encryption?
No server required
ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.
Fully validated
ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.
No special hardware required
TPM chips are optional but not required for using Full Disk Encryption.
Multi-platform
Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.
What They’re Saying
Customer Testimonials
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.
Helpful Quick Tips & Tricks
Cyber Security Tips
Use Two-Factor or Multi-Factor Authentication
Make sure all drives are encrypted
Backup to the cloud