- slide 1 of 8
How Does Endpoint Encryption Software Help Businesses?
Endpoint encryption software allows you to transfer a broad scope of confidential information across networks without risking security hazards. You can transfer customer data, intellectual property, legal and financial records and employee communications securely.
- slide 2 of 8
Symantec Endpoint Encryption
This endpoint encryption software will provide advanced encryption for a variety of computers and storage devices. Some of the key features include the ability to pre-boot your password authentication; support of multiple users in a network; mechanisms that will allow your team to share files securely; and central deployment, administration, and management of your encryption system.
New features include enhanced protection for keys stored in DRAM, improved disk recovery, self-extracting archives, and extended client support. Symantec Endpoint Encryption is compatible with Windows XP through Windows 7. A free trial is available.
- slide 3 of 8
McAfee Endpoint Encryption
Customize your encryption settings to grant or prohibit access to certain users or groups. The consistent and persistent protection will keep your confidential information secure whether you are operating your business or are shut down for the night. Protect your external devices and laptops with full-disk encryption. Automatically encrypt files and folders as you share them with your colleagues.
McAfee is compatible with Windows 2000 through Windows 7. A demo presentation is available on the website.
- slide 4 of 8
Check Point Full Disk Encryption
Made especially for laptops, Check Point Full Disk Encryption will encrypt the laptop’s entire hard drive against loss or theft. This includes the operating system that the computer runs on and temporary files. Check Point is compatible with Windows 2000 through Windows 7, plus Mac OS X (10.4.5 through 10.6.x).
Source: Check Point
- slide 5 of 8
Security BOX FullCrypt
Security BOX FullCrypt will protect the confidentiality of all data on your hard disk. This includes operating system data (register base, temporary files, system files, and more). Once you turn on your computer, you will have to go through an authentication process before your operating starts. Then your computer will start up and run as usual. This software runs on Windows 2000 through Vista.
Source: Security BOX FullCrypt
- slide 7 of 8
BitLocker is similar to Security BOX in that it encrypts your entire hard drive against hackers, loss and theft. Any file that you save on your drive is encrypted automatically. BitLocker To Go is a new feature of Windows 7 and gives the same protection to portable storage devices and external hard drives.
- slide 8 of 8
The purpose of this roundup was to give you a starting point on where to get endpoint encryption software. For more information about any of the listed software, please visit their website.