ESET® ENDPOINT ENCRYPTION powered by DESlock

Simple and powerful encryption for organizations of all sizes

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Endpoint Encryption powered by DESlock

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

Checkmark icon

Zero data breaches

Checkmark icon

Compliance with requirements

Checkmark icon

Seamless encryption


Zero impact on productivity

The implementation of encryption is completely transparent for the users and requires no action on their part. There is no extra overhead for IT departments and no need for user training.

Fast, seamless deployment

Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup of the solution under one hour.

Manage devices anywhere

ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs nor any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity making it extremely simple for businesses of any size to install and setup.

Use cases

PROBLEM

Businesses are in the news every single day notifying their customers that a data breach has occurred.

SOLUTION

  • Protect sensitive data with ESET Endpoint Encryption by means of full-disk encryption (FDE).
  • Protect vulnerable communications such as Remote Desktop by adding multi-factor authentication.
  • Require multi-factor authentication in order to log in to devices that contain sensitive data.
Mitsubishi logo

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 4,000 mailboxes

Canon logo

protected by ESET since 2016
more than 14,000 endpoints

T-com logo

ISP security partner since 2008
2 million customer base

The ESET difference

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

No special hardware required

TPM chips are optional but not required for using Full Disk Encryption.

Fully validated

ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.

Multi-platform

Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up. No firewall exclusions or open ports are required. The encryption server can run on any Windows PC or server.

Explore our customized solutions

Please leave us your contact details so we can design a personalized offer to fit your requirements.
No commitment.

Supported features

  • Full disk encryption (FDE)
  • File/folder encryption
  • USB encryption
  • E-mail encryption

Looking for the complete security of your network?

Related products and services

  • ESET Security Management Center
    Real-time network security visibility, reporting and management on a single screen.​​​​​​​
  • ESET Dynamic Threat Defense
    Cloud-based sandboxing technology detects never before seen or zero-day threats.
  • ESET Mail Security
    Powerful server malware protection, spam filtering and email scanning for all major email platforms.
  • Premium support
    Gives you 365/24/7 access to customer care specialists with years of experience in IT security.

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

We Live Security blog

You’d better change your birthday – hackers may know your PIN

Are you in the 26% of people who use one of these PIN codes to unlock their phones?

Instagram tests new ways to recover hacked accounts

Locked out and out of luck? The photo-sharing platform is trialing new methods to reunite you with your lost account

Corporate blog

Malware Researcher + Threat Analyst: two perspectives on the MITRE ATT&CK™ knowledge base

ATT&CK imprints an efficient mapping and documentation process on people engaging in activities as diverse as ruleset creation and product functionality, on to descriptions of threats mapped to...

Father’s Day 2019: Top tips for dad

As Father’s Day approaches, it’s time to tip our hats to all the dads out there who work ceaselessly to protect their kids – in the real world and the digital one.

See more

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Manage licenses

ESET Business Account is a license management platform and entry point to ESET cloud services.

Need assistance?

All ESET products come with free technical support in your language.