05.08.2013 Views

Full Disk Encryption Policies - Online Help Home - Trend Micro

Full Disk Encryption Policies - Online Help Home - Trend Micro

Full Disk Encryption Policies - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> <strong>Micro</strong> Endpoint <strong>Encryption</strong> 3.1.3 Administrator's Guide<br />

About Endpoint <strong>Encryption</strong><br />

1-2<br />

<strong>Trend</strong> <strong>Micro</strong> Endpoint <strong>Encryption</strong> is a fully integrated hardware-based and softwarebased<br />

encryption solution to protect laptops and desktops, files and folders, removable<br />

media, and encrypted USB drives with embedded anti-malware/antivirus protection.<br />

With Endpoint <strong>Encryption</strong>, Administrators can use a single management console to<br />

flexibly manage a combination of hardware and software-based encryption with full<br />

transparency for end-users.<br />

<strong>Trend</strong> <strong>Micro</strong> Endpoint <strong>Encryption</strong> ensures end-to-end data protection by providing<br />

FIPS 140-2 encryption of the data residing on the management server; all data<br />

transmitted to/from the server; all data stored on the endpoint device; and, all locally<br />

stored client logs.<br />

Using FIPS 140-2 accredited cryptography, Endpoint <strong>Encryption</strong> offers the following<br />

benefits:<br />

• Comprehensive data protection through fully integrated full disk, file, folder, USB<br />

drives, and removable media encryption.<br />

• Centralized policy administration and key management through a single<br />

management server and console.<br />

• Device management through device-specific information gathering and remote<br />

lock, reset, and the capability to wipe all endpoint data.<br />

• Advanced real-time reporting and auditing to ensure security compliance.<br />

Endpoint <strong>Encryption</strong> Components<br />

Endpoint <strong>Encryption</strong> consists of one central management server (PolicyServer Web<br />

Service) that manages the policy and log databases (MobileArmor DB), LDAP<br />

authentication with Active Directory, and all client-server activity. Endpoint <strong>Encryption</strong><br />

clients cannot interface directly with PolicyServer and must connect through the Client<br />

Web Service. For an illustration of this architecture, see Figure 1-1: Endpoint <strong>Encryption</strong><br />

Client-Server Architecture on page 1-3.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!