Call a Specialist Today! 866-981-2998

Trend Micro Endpoint Encryption
Data protection with encryption for desktops, laptops, and removable media

Endpoint Encryption
Trend Micro Products
Trend Micro Endpoint Encryption
Endpoint Encryption
Get a Quote!


The proliferation of data and devices in today’s enterprises has increased the complexity of protecting confidential data, meeting compliance mandates, and preventing costly data breaches. These challenges are further amplified as more and more employees bring their own computing devices to work in the name of productivity. Ensuring that sensitive data is secured in the case of device loss has never been more difficult.

Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices—PC and Macintosh laptops, desktops, CDs, DVDs, USB drives and any other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption with granular port and device control to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same interface for endpoint protection and other Trend security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Software & Hardware

Protection Points

  • Laptops, desktops
  • Removable media: CD/DVD/USB
  • Files and file volumes (folders)

Threat Protection

  • Privacy
  • Data protection
  • Regulatory Compliance
  • Securing intellectual property


Maximize Platform Coverage For Data & Device Encryption

Get comprehensive data protection on Macintosh and PC laptops, desktops, removable media, and mobile devices

  • Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption
  • Support and leverage flexible hardware and software-based encryption across mixed environments
  • Support self-encrypting drives from Seagate and emerging TCG OPAL and OPAL 2 SED standard
  • Enable automatic and transparent encryption without performance degradation

Lower Tco With Centralized Policy Administration & Key Management

Save more with an integrated solution that makes it easy to deploy, configure, and manage encryption

  • Gain visibility and control over encryption, monitoring and protection of data
  • Manage encryption policy alongside all endpoint security policies with integration to Trend Micro’s common management console, Control Manager
  • Simplify operations with a unified data repository with single management server and console
  • Automate policy enforcement with remediation of security events

Simplify Remote Device Management

  • Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password
  • Manage policies and protect data on PCs, laptops, USBs, CDs, DVDs
  • Identify a lost device before it boots so that appropriate policies can be applied using network-aware preboot authentication
  • Collect device-specific information such as device attributes, directory listing, and unique device iDs based on device name, MAC address, and CPU identifier
  • Improve protection for remote devices with tools to remotely lock, reset, or “kill” lost or stolen devices

Features & Benefits:

Key Features

Advanced Reporting & Auditing

  • Automate enforcement of regulatory compliance with policy-based encryption
  • Unify visibility and policy deployment with other Trend Micro products through integration with Trend Micro Control Manager
  • Receive detailed auditing and reporting by individual, organizational unit, and device
  • Assist compliance initiatives with audit trail for all administrative actions
  • Demonstrate compliance on demand with real-time auditing

Administrative Tools & Active Directory Integration

  • Provide remote one-time passwords across all endpoint client applications
  • Leverage Active Directory and existing IT infrastructure for deployment and management
  • Take the burden off iT staff by allowing users to change and reset passwords and accounts
  • Gain access to recovery console in Windows and preboot

Pre-boot Multi-factor Authentication

  • Gain flexible authentication, including fixed password, built-in multi-factor authentication, or integration with other authentication products
  • Ensure that lost or stolen devices can be remotely wiped or locked before they can boot using network-aware (wifi and hard wired)
  • Enable policy update before authentication
  • Trigger lockout feature in response to incorrect authentication attempts
  • Configure actions on failed password attempt threshold
  • Support multiple user and administrator accounts per device

Support For A Consumerized Environment

  • Provide management and visibility for Microsoft BitLocker encryption keys, especially useful for employee owned devices
  • Provide visibility and management of Apple FileVault encryption keys to manage Macintosh computers

Key Benefits

  • Helps ensure privacy and compliance enforcement with policy-based encryption
  • Lowers TCo with simplified deployment, configuration, and management
  • Provides comprehensive data security for laptops, desktops, removable media, and mobile devices
  • Helps ensure robust security through certifications including FiPS 140-2 Level 2
  • Maintains compliance and protect your data without disrupting users with remote management
Microsoft BitLocker Support* Apple FileVault Encryption Support* Trend Micro Full Disk Encryption Trend Micro File Encryption
Centralized policy and key management
FIPS 140-2 certification
AES 256-bit encryption AES 256 AES 128 AES 128 & 256 AES 256
File and folder encryption      
Removable media (CD/DVD/USB) encryption      
Self-encrypting drive management      
Full disk encryption  
Network-aware pre-boot authentication      

* Management for Microsoft Bitlocker and Apple FileVault is included with Trend Micro Endpoint Encryption.

Endpoint Encryption is a critical component of our Smart Protection Suites, which deliver even more data protection capabilities like data loss prevention (DLP) and device control but also gateway, mobile device, and endpoint with our XGen™ security-optimized threat protection capabilities like file reputation, machine learning, behavioral analysis, exploit protection, application control, and intrusion prevention (vulnerability protection). Additional Trend Micro solutions extend your protection from advanced attacks with endpoint investigation and detection. Plus, Trend Micro™ Deep Discovery™ network sandboxing delivers rapid response (real-time signature updates) to endpoints when a new threat is detected locally, enabling faster time-to-protection and reducing the spread of malware. All of this modern threat security technology is made simple for your organization with central visibility, management, and reporting.

System Requirements:

Policy Server

  • Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016 (64-bit only)
  • Physical or virtual server with 2.2 GHz Xeon Quad Core or above; 1 available vCPU
  • 8 GB RAM
  • 120 GB hard disk space

Full Disk and File Encryption

  • Windows 7, 8, 8.1, 10
  • Windows Embedded POSReady 7
  • Intel Core 2 Duo 2.0 GHz processor and above
  • 1 GB RAM
  • 30 GB hard disk, 20% free space


  • Windows 7,8,8.1, 10
  • Windows Embedded POSReady 7
  • Intel Core 2 Duo 2.0 GHz processor and above
  • 1 GB RAM
  • TPM 1.2 or higher
  • 30 GB hard disk with 20% free space


  • macOS 10.8, 10.9, 10.10, 10.11, 10.12
  • Intel Core 2 Duo 2.0 GHz processor and above
  • 2 GB RAM
  • 8 GB hard disk, 400 MB free space