Checkpoint Endpoint Security Faq

Trend Micro, famous for their antivirus software, also has software which provides management of Self-Encrypting Drives. Their Full Disk Encryption and Endpoint Encryption software performs this function. Working in combination with Trend’s Control Manager on a server, it provides the following benefits and more:

  • Provides flexible authentication, including fixed password, built-in multi-factor authentication, or integration with other authentication products
  • Ensures that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware management software (WiFi and hard wired)
  • Enables policy updates before authentication
  • Triggers a lockout feature in response to incorrect authentication attempts
  • Configures actions on failed password attempt threshold
  • Supports multiple user and administrator accounts per device
  • Provides audit trails and reports
  • Provides remote one-time passwords
  • Uses Active Directory on the server for deployment and management
  • Takes the burden off IT staff by allowing users to change and reset accounts and passwords

The Full Disk Encryption software will also provide full disk software encryption for PCs where SEDs are not available.  The Endpoint Encryption will secure data with full disk software encryption, folder and file encryption, and provide device control such as blocking USB devices from being inserted. It provides this security for any kind of drive including disk drives, CDs, DVDs, and USB flash drives.

endpoint security devices     endpoint security by bitdefender blocked this page