Network security

Trend Micro: Endpoint Encryption Data Protection Solution [product overview]

October 30, 2018 by Howard Poston

With the growing number of data breaches and the increased penalties associated with them, the need for an enterprise-wide solution for data encryption is essential. However, according to a survey by Thales eSecurity and the Ponemon Institute, only 43% of organizations have an encryption strategy that is consistently applied throughout the enterprise. Trend Micro’s Endpoint Encryption is an option for an organization seeking a comprehensive endpoint encryption solution.

What Is Trend Micro Endpoint Encryption?

Trend Micro’s Endpoint Encryption is a data encryption solution for computers and removable media. It offers encryption at the full-disk, file and folder levels as well as providing support for encryption removable media like USB drives, CDs and DVDs.

Endpoint Encryption has a variety of useful features. Some of the key features include:

  • Built-in auditing and reporting
  • Enterprise-scale administrative tools
  • Authentication configurability
  • Support for built-in encryption products

Key Features

Trend Micro has designed Endpoint Encryption to be an all-in-one solution for an organization’s data encryption needs. It includes a variety of functionality covering everything from configuration to auditing and reporting. In this section, we will explore some of the key features of the Endpoint Encryption solution.

Built-In Auditing and Reporting

One of the primary reasons for deploying a full-disk encryption solution is to ensure adequate protection of sensitive data in accordance with the appropriate laws and regulations. Trend Micro’s Endpoint Encryption solution provides automated enforcement of regulatory compliance including the ability to generate reports at an individual, department, or device level. To aid in demonstrating regulatory compliance, Endpoint Encryption can generate an audit trail for administrative actions and enables live auditing to demonstrate compliance on-demand.

Enterprise-Scale Administrative Tools

Trend Micro’s Endpoint Encryption integrates with Microsoft’s Active Directory to facilitate management of devices over multiple AD domains. It also enables the administrator to distribute single-use passwords to programs on client machines and to access the Windows preboot recovery console.

Authentication Configurability

Windows supports configuration of authentication policies and procedures and Trend Micro’s Endpoint Encryption solution is designed to integrate with and take advantage of this functionality. As a result, Endpoint Encryption can be used to configure failed login threshold and lockout mechanisms, login via multi-factor authentication and support multiple user and administrator accounts on the device.

Endpoint Encryption has preboot control of the protected system. This means that the software can force installation of updates before the user can gain access to the system. Additionally, preboot control helps protect lost or stolen devices by wiping them before they could be booted.

Support for Built-In Encryption Products

Microsoft offer BitLocker and Apple offers FileVault for endpoint protection of Windows and Mac computers. Trend Micro’s Endpoint Encryption includes the ability to manage and configure policies for these solutions and provides visibility on their operation throughout the enterprise.

Trend Micro Integration With InfoSec SecurityIQ

InfoSec Institute is dedicated to improving your organization’s cybersecurity posture through user education. As part of this effort, InfoSec has developed SecurityIQ, an event-driven user education system designed to improve user cybersecurity knowledge and behaviors by tailoring delivered learning to the needs of the specific individual.

SecurityIQ delivers tailored microlearning security education by observing user behavior and deploying small educational modules when the user takes an action that endangers personal or corporate cybersecurity. For example, falling for a phishing email will result in a user being presented with a module focusing on the risks of phishing and the necessary protective behaviors. These modules are designed to be consumed in less than a minute in order to have minimal impact on the employee’s workflow while helping to build a strong security culture.

In order to identify situations in which an employee is performing these dangerous actions, SecurityIQ is designed to integrate with a variety of endpoint security products. Trend Micro’s Endpoint Encryption is one of the available integrations, designed to help an organization gauge and maintain its regulatory compliance by implementing a strong data encryption policy. If users take actions in violation of organizational policy, they will receive tailored microlearning designed to inform them of the associated risks and educate them about official policy.

The Benefits of Trend Micro Endpoint Encryption

Trend Micro’s Endpoint Encryption is designed to help an organization develop and deploy an enterprise-wide encryption solution. It supports encryption on Windows and Mac at the disk and file/folder levels as well as providing encryption functionality for removable devices. The built-in functionality enables enterprise-wide policy enforcement, auditing and reporting to ensure compliance with applicable laws and regulations.

By integrating Endpoint Encryption with SecurityIQ, your organization can improve its overall security posture by providing both software and training solutions to issues arising from poor data protection behaviors.

 

Sources

2018 Global Encryption Trends Study, Thales

Endpoint Encryption, Trend Micro

Posted: October 30, 2018
Howard Poston
View Profile

Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security.