We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Device Posture

Endpoint Encryption

Endpoint encryption protection prevents unauthorized users from accessing the data from the endpoint and is commonly used in enterprises to comply with regulations governing processing of sensitive information.

The Device Posture Module enables discovery of hard disk encryption software on the device and provides information about the encryption. This Module leverages our patented method for assessing the encryption status of selected disks and operates independently of third-party encryption algorithms and configurations. It supports all commonly used encryption solutions.

Detection

Identify endpoint encryption software installed on the endpoint, together with version, vendor and marketing names.

Configuration

Find out the state of the encryption process, whether the entire disk or only certain volumes are encrypted; determine the location of encrypted volumes , identify the encryption algorithm used, discover if the product supports whole disk encryption and other configuration information which can help organizations achieve regulatory compliance such as HIPAA and PCI.

Endpoint Encryption

It may take a few seconds for the list to load. Search and filters are available.

Build Stronger Products with
Embedded Endpoint Protection

Fill out the form and we’ll be in touch within 1 business day.
Trusted by 1,900+ businesses worldwide.