See Enc PB101
See Enc PB101
Overview
Symantec® Endpoint Encryption combines strong full-disk and removable
media encryption. Built on world-leading PGP® encryption technology with
AT A GLANCE an intuitive central management platform, it protects sensitive data from
Endpoint Encryption provides strong loss or theft and helps administrators prove a device was encrypted should
full-disk and removable media it go missing. Endpoint Encryption provides the following key features and
encryption to protect sensitive data benefits:
from loss or theft.
• Comprehensive endpoint encryption
KEY BENEFITS • Strong cryptography
• Maximize protection to ensure no • User experience
files are left unencrypted • Enterprise class management
• Comply with government and With these core features, Endpoint Encryption enables your remote and
industry requirements with strong mobile workforce to be productive from anywhere, while protecting any
cryptography sensitive data that may be stored on their devices. The solution also helps
customers to maintain world-class security standards and simplify their
• Ease of use and multiple recovery
workload.
options to reduce the burden on
end users and administrators
Comprehensive Endpoint Encryption
• Consolidated encryption
During the initial encryption phase, Endpoint Encryption uses a FIPS 140-2
administration to reduce operations
validated cryptographic module to encrypt each drive, sector by sector,
burden
ensuring that no files are left unencrypted for maximum protection. The
solution also supports trusted platform module authentication with auto-
KEY FEATURES login to prove a user’s identity when they authenticate to their device.
• Comprehensive endpoint This authentication further helps provide security against threats such as
encryption for mobile workforce, firmware and ransomware attacks.
laptops, and removable media
• Architecture provides superior Strong Cryptography
scalability to easily adapt to large Endpoint Encryption uses a FIPS 140-2 validated cryptographic module.
enterprise environments This cryptographic module can help customers comply with a range of
government and industry requirements such as Continuous Diagnostics and
• Single sign-on to eliminate the need
Mitigation, Payment Card Industry Data Security Standard, Health Insurance
to re-input multiple passwords
Portability and Accountability Act, and the EU General Data Protection
• Multiple options to enable the Regulation. In many cases, when a data breach occurs, organizations must
correct mix of self-assisted recovery notify victims and governing bodies of what happened. With encryption
and administrator-assisted recovery in place, organizations can apply for Safe Harbor, removing the need to
disclose the event if a data breach occurred.
• Centralized management of native
operating system encryption and
Opal-compliant self-encrypting
User Experience
drives The following features improve the Endpoint Encryption user experience:
• Single Sign-On: Once encrypted, a user only needs to enter their
passphrase to login to their device, and single sign-on technology passes
them through to their main screen. As users access their encrypted data,
decryption and re-encryption happens instantaneously, eliminating the
need to enter another password for a seamless experience. Smart cards
are also supported when stronger authentication is required.
Endpoint Encryption
Product Brief
Summary
The current shift to remote work has only accelerated the trend to support Bring Your Own Device. Employees
rely on mobility and anywhere, anytime access to stay productive. Unfortunately, sensitive or regulated data may
be unknowingly synchronized from the cloud and stored on their devices, putting this data at risk if these devices
are lost or stolen. Endpoint Encryption protects sensitive information and ensures regulatory compliance, by
encrypting all files stored on these devices for maximum security.