Apex One Endpoint Encryption Datasheet
Apex One Endpoint Encryption Datasheet
Apex One Endpoint Encryption Datasheet
Trend Micro™
The proliferation of data and devices in today’s enterprises has increased the complexity SOFTWARE & HARDWARE
of protecting confidential data, meeting compliance mandates, and preventing costly data
Protection Points
breaches. These challenges are further amplified as more and more employees bring
•• Laptops, desktops
their own computing devices to work in the name of productivity. Ensuring that sensitive
•• Removable media: USB/CD/DVD
data is secured in the case of device loss has never been more difficult.
•• Files and file volumes (folders)
Trend Micro™ Apex One™ Endpoint Encryption encrypts data on a wide range of Threat Protection
devices — both PCs and Macs, laptops and desktops, USB drives, and other removable •• Privacy
media. Available as a separate agent,this solution combines enterprise-wide full disk, •• Data protection
file/folder, and removable media encryption to prevent unauthorized access and use of •• Regulatory compliance
private information. A single, well-integrated management console allows you to manage •• Securing Intellectual property
your users holistically—using the same console for endpoint protection and other Trend
Micro security products. Deploying Trend Micro Endpoint Encryption agent helps ensure
that your data will continue to be protected as your mobile computing devices and
organizational needs change.
ADVANTAGES
Maximize Platform Coverage Lower TCO with Centralized Policy Simplify Remote Device Management
for Data and Device Encryption Administration and Transparent •• Maintain compliance and protect your data
Key Management without disrupting users in the event of a
Get comprehensive data protection on Macs
lost device or forgotten password
and PC laptops, desktops, removable media, Save more with an integrated solution that
and mobile devices makes it easy to deploy, configure, and •• Manage policies and protect data on
•• Encrypt private data with fully integrated manage encryption PCs, Macs, laptops, desktops, USBs, and
full disk, file folder, USB, and removable •• Manage encryption policy alongside all removable media
media encryption endpoint security policies with integration •• Collect device-specific information such
•• Support and leverage flexible hardware and to a common management console, Trend as device attributes, directory listing, and
software-based encryption across mixed Micro™ Control Manager™ unique device IDs based on device name,
environments •• Gain visibility and control over encryption, MAC address, and CPU identifier
•• Support self-encrypting TCG OPAL and monitoring, and protection of data •• Improve protection for remote devices
OPAL 2 SED drives from Seagate, SanDisk •• Automate policy enforcement with with tools to remotely lock, reset, or “kill”
remediation of security events without the lost or stolen devices, even before a device
•• Simplify deployment and management with boots using network-aware pre-boot
support for UEFI firmware, multiple physical burden of encryption key management
authentication
drives, and pre-boot screen customization •• Tight integration with Trend Micro’s iDLP
•• Enable automatic and transparent delivers content-based encryption for data
encryption without performance at rest and in motion
degradation
* Management for Microsoft Bitlocker and Apple FileVault is included with Trend Micro Endpoint Encryption (requires separate agent)
©2019 by Trend Micro Incorporated. All rights reserved. Trend Micro, and
the Trend Micro t-ball logo, OfficeScan and Trend Micro Control Manager
are trademarks or registered trademarks of Trend Micro Incorporated. All
other company and/or product names may be trademarks or registered
trademarks of their owners. Information contained in this document is
subject to change without notice.
[DS10_Endpoint_Encryption_ Datasheet_190128US]
www.trendmicro.com