Skip to content

Endpoint Encryption

Full disk, file encryption and data management

Ensure data privacy by encrypting data stored on your endpoints—especially laptops, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with full disk encryption, folder and file encryption, and removable media encryption.

Endpoint Encryption
  • Protect data at rest with full disk encryption software
  • Automate data management with self-encrypting hard drives
  • Encrypt data in specific files, shared folders, removable media
  • Set granular policies for device control and data management
  • Windows 8 support

Secure data on your PCs, laptops, notebooks, CDs, DVDs, and USB flash drives with leading endpoint data encryption, including full disk encryption, folder and file encryption, device control and data management.


Trend Micro Endpoint Encryption helps you prevent data theft and accidental data loss along with the compliance violations, reputation damage, and revenue loss. This comprehensive, easy-to use data encryption solution is centrally managed and policy-driven, to give you better data protection—with less effort.

Centralized policy management server
A single console makes it easy to manage encryption keys and synchronize policy across all encryption components. It also enforces secure authentication and provides the real-time auditing tools to ensure regulatory compliance. Other data management features include user-based self-help options and remote device control.

Full disk encryption
In the event a device is lost or stolen, full disk encryption ensures your data is unreadable. We offer a software- or hardware-based solution to fit your needs. For low startup costs, our software-based full disk encryption uses FIPS-140 certified encryption with a secure pre-boot authentication. When automation and ease-of-use are a priority, our hardware-based full disk encryption deploys and manages self-encrypting drives using the OPAL and OPAL 2 standard.

Folder and file encryption
Encrypt select files, folders, or external media by using a drag and drop, single-click capability. Users simply need a user key, group key, static one-time password, or smartcard certificate. Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization.

Removable media encryption
Allow administrators to enforce policy and protect data that is copied to removable media such as USB drives, CDs and DVDs. From the centralized policy console, encryption can be enforced or made optional for users writing to these devices.

Granular device control and data management
With powerful IT controls, administrators can restrict or deny access to external devices that may be connected to a user’s PC. For example, users may be allowed to access USB drives, but only as read-only. Or exceptions could be created that allow users to save data on specific USB drives.

Audit-ready user and device management
In the event you lose a device, compliance mandates may require you to prove the device was encrypted. Trend Micro Endpoint Encryption’s advanced management console offers real-time status reports, including the last time a particular device was connected to your network. And with devices that have network-aware pre-boot options, administrators can reset or “kill” a lost or stolen device before it re-boots. The central management console has capabilities to recover lost data, update policies, and deploy new devices with ease.

Data encryption and authentication to fit your needs
Trend Micro Endpoint Encryption is available in a variety of platform options. Full disk encryption can be deployed as a software solution or OPAL and OPAL 2 compliant self-encrypting drives. Whatever the method, all devices are secured with a robust AES256 encryption algorithm. There are many options for user authentication, including RSA SecureID.

Data encryption certifications to ensure compliance
Industry mandates and legislation often describe how devices should be encrypted and require detailed product certifications. Trend Micro encryption products are covered by the most stringent and up-to-date standards, such as FIPS-140-2/3, Common Criteria, and NSTISSP to name a few.

Lower cost of endpoint encryption
Reduce your cost of ownership through integration with other Trend Micro management tools and innovative deployment capabilities that let you easily deploy without disrupting users. Once deployed, the automated reporting, auditing, and policy updating means that administering encrypted devices is easy. An optional end-user self-service portal for password administration further reduces IT management.

Client devices

  • Microsoft® Windows® 8 (32/64-bit)
  • Microsoft® Windows® 7 (32/64-bit)
  • Microsoft Windows Vista™ (32/64-bit)
  • Microsoft Windows XP (32-bit)
  • Microsoft® .NET Framework 2.0 SP1 or higher installed

Management server console

  • Microsoft® Windows Server® 2003
  • Microsoft Windows Server 2008
  • Microsoft® SQL Server® 2008
  • Microsoft SQL Server 2005
  • 32 and 64-bit Standard or Enterprise

Management server hardware requirements

  • Pentium III class or above
  • 256 MB memory
  • 4 GB (IDE and SATA) drives
  • Video card with XVESA compliance

Endpoint client requirements

  • Intel™ Core™ 2 or compatible processor
  • Full disk encryption
    • 1 GB memory
    • 30 GB disk space
  • File encryption
    • 512 MB memory
    • 2 GB disk space

Social Media

Connect with us on