+
+

Related Products

  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,195 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • DriveStrike
    23 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • Files.com
    303 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Proton Drive
    3,602 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website

About

Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.

About

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other Trend Micro security products. Deploying the Endpoint Encryption agent helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams and anyone seeking a solution to manage their security operations

Audience

Businesses, governments, and consumers that need an endpoint encryption solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Sophos
United States
www.sophos.com

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com

Alternatives

Alternatives

Panda Full Encryption

Panda Full Encryption

WatchGuard Technologies
BitLocker

BitLocker

Microsoft

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Integrations

ConnectProtect Managed Detection and Response
Airlock
Anitian FedRAMP Comprehensive
AriLinc
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Social Mining
Comarch Wealth Management
Datto RMM
Datto Workplace
Graylog
MaxPatrol
OctoXLabs
Product Marketing Alliance
RapidScale Identity as a Service
SaaShop

Integrations

ConnectProtect Managed Detection and Response
Airlock
Anitian FedRAMP Comprehensive
AriLinc
Comarch Business Intelligence
Comarch EDI
Comarch Master Data Management
Comarch Social Mining
Comarch Wealth Management
Datto RMM
Datto Workplace
Graylog
MaxPatrol
OctoXLabs
Product Marketing Alliance
RapidScale Identity as a Service
SaaShop
Claim Sophos Central Device Encryption and update features and information
Claim Sophos Central Device Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information
Claim Trend Micro Endpoint Encryption and update features and information