Call a Specialist Today! 800-886-5369

Trend Micro Endpoint Encryption
Robust data protection and device control for desktops, laptops, and removable media

Trend Micro Products
Trend Micro Endpoint Encryption
Endpoint Encryption
Get a Quote!


Robust encryption and device control for desktops, laptops, and removable media

The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplified as more and more employees bring their own computing devices to work in the name of productivity. Ensuring that sensitive data is secured in the case of device loss has never been more difficult.

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices—PC and Macintosh laptops, desktops, CDs, DVDs, USB drives and any other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption with granular port and device control to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same interface for endpoint protection and other Trend security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Software & Hardware

Protection Points

  • Laptops, desktops
  • Removable media: CD/DVD/USB
  • Files and file volumes (folders)

Threat Protection

  • Privacy
  • Data protection
  • Regulatory Compliance
  • Securing intellectual property


Maximize Platform Coverage For Data & Device Encryption

Get comprehensive data protection on Macintosh and PC laptops, desktops, removable media, and mobile devices

  • Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption
  • Support and leverage flexible hardware and software-based encryption across mixed environments
  • Support self-encrypting drives from Seagate and emerging TCG OPAL and OPAL 2 SED standard
  • Enable automatic and transparent encryption without performance degradation

Lower Tco With Centralized Policy Administration & Key Management

Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption

  • Gain visibility and control over encryption, monitoring and protection of data
  • Manage encryption policy alongside all endpoint security policies with integration to Trend Micro’s common management console, Control Manager
  • Simplify operations with a unified data repository with single management server and console
  • Automate policy enforcement with remediation of security events

Simplify Remote Device Management

  • Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password
  • Manage policies and protect data on PCs, laptops, USBs, CDs, DVDs
  • Identify a lost device before it boots so that appropriate policies can be applied using network-aware preboot authentication
  • Collect device-specific information such as device attributes, directory listing, and unique device iDs based on device name, MAC address, and CPU identifier
  • Improve protection for remote devices with tools to remotely lock, reset, or “kill” lost or stolen devices

Features & Benefits:

Key Features

Advanced Reporting & Auditing

  • Automate enforcement of regulatory compliance with policy-based encryption
  • Unify visibility and policy deployment with other Trend Micro products through integration with Trend Micro Control Manager
  • Receive detailed auditing and reporting by individual, organizational unit, and device
  • Assist compliance initiatives with audit trail for all administrative actions
  • Demonstrate compliance on demand with real-time auditing

Administrative Tools & Active Directory Integration

  • Provide remote one-time passwords across all endpoint client applications
  • Leverage Active Directory and existing IT infrastructure for deployment and management
  • Take the burden off iT staff by allowing users to change and reset passwords and accounts
  • Gain access to recovery console in Windows and preboot

Pre-boot Multi-factor Authentication

  • Gain flexible authentication, including fixed password, built-in multi-factor authentication, or integration with other authentication products
  • Ensure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (wifi and hard wired)
  • Enable policy update before authentication
  • Trigger lockout feature in response to incorrect authentication attempts
  • Configure actions on failed password attempt threshold
  • Support multiple user and administrator accounts per device

Support For A Consumerized Environment

  • Provide management and visibility for Microsoft BitLocker encryption keys, especially useful for employee owned devices
  • Provide visibility and management of Apple FileVault encryption keys to manage Macintosh computers

Key Benefits

  • Helps ensure privacy and compliance enforcement with policy-based encryption
  • Lowers TCo with simplified deployment, configuration, and management
  • Provides comprehensive data security for laptops, desktops, removable media, and mobile devices
  • Helps ensure robust security through certifications including FiPS 140-2 Level 2
  • Maintains compliance and protect your data without disrupting users with remote management
  On-Board Key Managment Enterprise-wide Encryption
Microsoft BitLocker Support* Apple FileVault Encryption Support* Trend Micro Endpoint Encryption Trend Micro Full Disk Encryption Trend Micro File Encryption
Centralized policy and key management
FIPS 140 encryption certification Level 2 Level 1 Level 2 Level 2 Level 2
AES 256-bit encryption AES 256 XTS-AES 128 AES 256 AES 256 AES 256
File and folder encryption      
Removable media (CD/DVD/USB) encryption      
Granular port and device control      
Self-encrypting drive management    
Full disk encryption  
Network-aware pre-boot authentication      

* Microsoft Bitlocker and Apple FileVault support are included in Trend Micro Endpoint Encryption and Trend Micro Full Disk Encryption.

Expand Data Security — For Complete End User Protection

Trend Micro Endpoint Encryption is an essential part of an enterprise data protection strategy. If you already have a Trend Micro threat protection suite, consider adding Trend Micro™ Enterprise Data Protection, which includes:

  • Trend Micro™ Endpoint Encryption
  • Trend Micro™ Email Encryption Gateway
  • Trend Micro™ Mobile Security
  • Trend Micro™ integrated Data Loss Prevention

By combining threat and data protection in a flexible, centrally-managed suite, it lowers the cost and effort to deploy and manage while closing critical security gaps—for complete end user protection. Enterprise Data Protection is also included in our most comprehensive enterprise security suite: Trend Micro™ Enterprise Security and Data Protection.

System Requirements:

Minimum Requirements

Policy Server
Windows 2003, 2008, 2008 R2

  • 2GHz Dual Quad Core Core2 IntelTM XeonTM Processors
  • 4GB RAM
  • 40GB Raid 1 hard disk space

Windows XP Vista, 7, 8, 8.1, 10

  • Windows Embedded POSReady 7
  • Intel Core 2 or compatible processor
  • 1GB RAM
  • 30GB hard disk with 20% free space

Windows 7, 8, 8.1, 10

  • Intel Core 2 or compatible processor
  • 1GB RAM
  • TPM 1.2 or higher
  • 30GB hard disk with 20% free space

OS X 10.7, 10.8, 10.9, 10.10

  • Intel Core 2 or compatible processor
  • 2GB RAM
  • 8GB hard disk