110m+
users worldwide
400k+
business customers
ESET Endpoint Encryption
An encryption application with full remote control of endpoint policy and shared encryption keys to protect files and data across devices, meeting the compliance standards of regulations like GDPR and SOX.

Zero data breaches

Compliance with requirements

Seamless encryption
Manage devices anywhere
ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs nor any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity making it extremely simple for businesses of any size to install and setup.
Zero impact on productivity
The implementation of encryption is completely transparent for the users and requires no action on their part. There is no extra overhead for IT departments and no need for user training.
Fast, seamless deployment
Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup of the solution under one hour.
Endpoint Encryption Variants
Essential Edition | Mobile Edition | Standard Edition | Pro | |
---|---|---|---|---|
Fast and transparent pre-boot security.Full disk encryption | ||||
Policy-driven removable media encryption suitable for any corporate security policy.Removable media encryption | ||||
Easy to use on-device software for use on unlicensed systems."Go" portable encryption | ||||
Fast and transparent, provides an extra layer of security.File & folder encryption | ||||
Easily send and receive encrypted emails and attachments through Outlook.Outlook plugin for email & attachments | ||||
Encrypt all or part of a text window - web-browsers, database memo-fields or web-mail.Text & clipboard encryption | ||||
Create a secure, encrypted volume on your PC or in another location or an encrypted copy of an entire directory tree and its files.Virtual disks & encrypted archives | ||||
Full control of licensing and software features, security policy and encryption keys.Centralised management compatible |
Use cases
PROBLEM
Businesses are in the news every single day notifying their customers that a data breach has occurred.
SOLUTION
- Protect sensitive data with ESET Endpoint Encryption by means of full-disk encryption (FDE).
- Protect vulnerable communications such as Remote Desktop by adding multi-factor authentication.
- Require multi-factor authentication in order to log in to devices that contain sensitive data.

protected by ESET since 2017
more than 9,000 endpoints

protected by ESET since 2016
more than 14,000 endpoints
The ESET difference
No server required
ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.
No special hardware required
TPM chips are optional but not required for using Full Disk Encryption.
Fully validated
ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.
Multi-platform
Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up. No firewall exclusions or open ports are required. The encryption server can run on any Windows PC or server.
Try before you buy
Why not download a free trial license with absolutely no commitment on your side.
Supported features
- Full disk encryption (FDE)
- File/folder encryption
- USB encryption
- E-mail encryption
Looking for the complete security of your network?
Related enterprise-grade solutions

ESET Endpoint Protection Advanced
- Security Management Center
- Endpoint Protection Platform

ESET Identity & Data Protection
- Multi-factor Authentication
- Endpoint Encryption
Related products and services
- ESET Secure Authentication
Powerful Two-factor authentication makes access to networks and data safe and problem-free. - Data Loss Prevention
Safetica protects you from expensive data leaks and unnecessary personnel costs. - ESET Endpoint Security
Award-winning multilayered technology combining machine learning, big data and human expertise.
Stay on top of cybersecurity news
Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.