Encryption

Seamless and fully validated encryption ensure your organization’s data is protected in compliance with laws and regulations.

Robust encryption for system disks, partitions or entire devices

Encryption

 

Seamless and fully validated encryption ensure your organization’s data is protected in compliance with laws and regulations.

BENEFITS    |    USE CASES
SOLUTIONS    |    SYS REQUIREMENTS

Why do customers appreciate our encryption?

Data breaches prevention

Minimize risks of business continuity disruptions and ensure the organization and its data are protected anywhere and anytime.

Fast seamless deployment

Our encryption solution is tailored to keep setup time to the absolute minimum.

Regulatory compliance

Meet legal requirements and regulations such as GDPR, CCPA, LGPD, or POPI.

Common use cases

Worried about

Data breaches?

Businesses appear in the news every single day to alert their customers that a data breach has occurred.

Worried about

Managing remote employees?

Companies need the ability to protect sensitive data in the case of employee termination or when devices are lost or stolen.

Worried about

Data leakage?

Every company uses removable media devices to move data from one computer to another, but most companies do not have a way to verify that the data is staying only on company devices.

What makes our solutions a perfect fit for your needs?

 

Encryption


Encryption

ESET Full Disk Encryption

A powerful encryption managed natively by ESET PROTECT console. It increases your organization's data security that meets compliance regulations.
 

  • Encrypt system disks, partitions or entire drives
  • Manage from ESET PROTECT Console
  • Deploy, activate and encrypt devices in a single action

Explore ESET Full Disk Encryption features

All products managed from one console

ESET Full Disk Encryption works within the ESET PROTECT console, helping administrators to save time thanks to familiarity with the existing management environment and concepts.

Fully validated

Patented technology to protect data for businesses of all sizes. ESET Full Disk Encryption is FIPS 140-2 validated with 256 bit AES encryption. 

Powerful encryption

ESET Full Disk Encryption encrypts system disks, partitions and entire drives to ensure that everything stored on each PC or laptop is locked down and secure, protecting you against loss or theft.

Cross-platform coverage

Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard. 

Single-click deployment

Manage full disk encryption across your entire network from a cloud‑based console. ESET PROTECT single pane of glass allows admins to deploy, activate and manage encryption on their connected endpoints with a single click.

Add additional devices at any time

You can increase the number of devices covered by your license at any time.

System requirements

Supported operating systems:

  • Microsoft Windows 7, 8, 8.1, 10
  • macOS 10.14 (Mojave) and higher

Requirements

  • deployed ESET PROTECT console in cloud or on-premises

 

Encryption


Encryption

ESET Endpoint Encryption

A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

  • Zero data breaches
  • Meet compliance requirements
  • Seamless encryption

Explore ESET Endpoint Encryption features

Fully validated

Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. 

Cross-platform coverage

Manage encryption on Windows machines and native macOS encryption (FileVault) from a single dashboard.

Granular data protection

ESET Endpoint Encryption gives companies enhanced ability to protect specific files, folders, virtual disks or archives.

Protect data in transit

By encrypting emails and attachments, and restricting access to removable media for specific users, you can protect data in transit and prevent their leakage outside the company.

Centralized management 

Full control of licensing and software features, security policy and encryption keys from a dedicated ESET Endpoint Encryption console.

System requirements

Supported operating system


Client OS: Windows 11, 10, 8.1, 8, 7, macOS 10.14 (Mojave) and higher
Server OS: Windows Server 2022, 2019, 2016, 2012 R2, 2012, 2008 R2

Committed to the highest industry standards

Respected by industry analysts

Learn more

Awarded in independent tests

See test results

Appreciated by customers worldwide

Read full reviews

Purchase your encryption today

ESET's encryption is available in the following solutions

Best-in-class endpoint protection against ransomware & zero-day threats, backed by powerful data security.

All included capabilities:
  • Console
  • Modern Endpoint Protection
  • Server Security
  • Mobile Threat Defense
  • Full Disk Encryption
  • Advanced Threat Defense
  • Cloud App Protection
  • Mail Server Security
  • Vulnerability & Patch Management
  • Extended Detection & Response
  • Multi-Factor Authentication
  • MDR Service
  • Premium Support Essential

Complete, multilayered protection for endpoints, cloud applications and email, the number one threat vector.

All included capabilities:
  • Console
  • Modern Endpoint Protection
  • Server Security
  • Mobile Threat Defense
  • Full Disk Encryption
  • Advanced Threat Defense
  • Cloud App Protection
  • Mail Server Security
  • Vulnerability & Patch Management
  • Extended Detection & Response
  • Multi-Factor Authentication
  • MDR Service
  • Premium Support Essential

All-in-one prevention, detection & response combining enterprise-grade XDR with complete multilayered protection.

Price available on request
Leave us your contact details to receive an offer tailored for your company's needs.

All included capabilities:
  • Console
  • Modern Endpoint Protection
  • Server Security
  • Mobile Threat Defense
  • Full Disk Encryption
  • Advanced Threat Defense
  • Cloud App Protection
  • Mail Server Security
  • Vulnerability & Patch Management
  • Extended Detection & Response
  • Multi-Factor Authentication
  • MDR Ultimate Service
  • Premium Support Advanced