Skip to content

Trend Micro Endpoint Encryption

More Options

Full disk, file encryption and data protection

Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with full disk encryption, folder and file encryption, and removable media encryption.

Endpoint Encryption
  • Protect data at rest with full disk encryption software
  • Automate data management with self-encrypting hard drives
  • Encrypt data in specific files, shared folders, removable media
  • Set granular policies for device control and data management

Secure data on your PCs, Macintoshes, CDs, DVDs, and USB flash drives with full disk encryption, folder and file encryption, and device control.


Trend Micro Endpoint Encryption helps you prevent data theft and accidental data loss along with the compliance violations, reputation damage, and revenue loss. Endpoint Encryption can be managed as a standalone solution or integrated with other Trend Micro products, such as OfficeScan and Control Manager.

Centralized visibility and control
A single console makes it easy to manage encryption keys and synchronize policy across all encryption components. It also enforces secure authentication and provides the real-time auditing tools to ensure regulatory compliance. Other data management features include user-based self-help options and remote device control. Trend Micro Control Manager can also be used to provide a unified management console with other Trend Micro products. The encryption client can also be deployed with Trend Micro OfficeScan endpoint security.

Full disk encryption
In the event a device is lost or stolen, full disk encryption ensures your data is unreadable. We offer a software- or hardware-based solution to fit your needs. For low startup costs, our software-based full disk encryption uses FIPS-140 certified and Common Criteria  encryption with a network-aware pre-boot authentication. When automation and ease-of-use are a priority, our hardware-based full disk encryption deploys and manages self-encrypting drives using the OPAL and OPAL 2 standard.

Folder and file encryption
Encrypt select files, folders, or external media by using a drag and drop, single-click capability. Users simply need a user key, group key, static one-time password, or smartcard certificate. Files can be encrypted with a self-extracting executable if they are going to be shared outside the organization.

Removable media encryption
Allow administrators to enforce policy and protect data that is copied to removable media such as USB drives, CDs and DVDs. From the centralized policy console, encryption can be enforced or made optional for users writing to these devices.

Support for Native Encryption
Trend Micro Endpoint Encryption can manage Microsoft BitLocker and Apple FileVault which are encryption products delivered within the operating systems. Now corporate policy and control can be applied to those devices without the need to install an encryption agent.

Audit-ready user and device management
In the event you lose a device, compliance mandates may require you to prove the device was encrypted. Trend Micro Endpoint Encryption’s advanced management console offers real-time status reports, including the last time a particular device was connected to your network. And with devices that have network-aware pre-boot options, administrators can reset or “kill” a lost or stolen device before it re-boots. The central management console has capabilities to recover lost data, update policies, and deploy new devices with ease.

Data encryption and authentication to fit your needs
Trend Micro Endpoint Encryption is available in a variety of platform options. Full disk encryption can be deployed as a software solution or OPAL and OPAL 2 compliant self-encrypting drives. Whatever the method, all devices are secured with a robust AES256 encryption algorithm. There are many options for user authentication, including RSA SecureID tokens.

Support for more devices, more platforms
Choose between managing encryption keys available through OS vendors such as Microsoft BitLocker or Macintosh FileVault. Or deploy Trend Micro's advanced encryption agent to your devices.

Data encryption certifications to ensure compliance
Industry mandates and legislation often describe how devices should be encrypted and require detailed product certifications. Trend Micro encryption products are covered by the most stringent and up-to-date standards, such as FIPS-140-2/3, Common Criteria, and NSTISSP to name a few.

Lower cost of endpoint encryption
Reduce your cost of ownership through integration with other Trend Micro management tools and innovative deployment capabilities that let you easily deploy without disrupting users. Once deployed, the automated reporting, auditing, and policy updating means that administering encrypted devices is easy. An optional end-user self-service portal for password administrationfurther reduces IT management.

Minimum Requirements

Policy Server

  • Windows 2003, 2008, 2008 R2, 2012, 2012 R2
  • 2 GHz Dual Quad Core Core 2 Intel™ Xeon™ Processors
  • 4 GB RAM
  • 40 GB hard disk space


  • Windows 7, 8, 8.1, 10
  • Windows Embedded POSReady 7
  • Intel Core 2 or compatible processor
  • 1 GB RAM
  • TPM 1.2 or higher
  • 30 GB hard disk with 20% free space

Full Disk and File Encryption

  • Windows XP, Vista, 7, 8, 8.1, 10
  • Windows Embedded POSReady 7
  • Intel Core 2 or compatible processor
  • 1 GB RAM
  • 30 GB hard disk with 20% free space


  • OS X 10.7, 10.8, 10.9, 10.10
  • Intel Core 2 or compatible processor
  • 2 GB RAM
  • 8 GB hard disk

Social Media

Connect with us on