ESET® ENDPOINT ENCRYPTION

Simple, powerful endpoint encryption software

Business computer security software for small and large organisations.
Contact us on 01202 405 401 for more information

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Endpoint Encryption

An encryption application with full remote control of endpoint policy and shared encryption keys to protect files and data across devices, meeting the compliance standards of regulations like GDPR and SOX.

Checkmark icon

Zero data breaches

Checkmark icon

Compliance with requirements

Checkmark icon

Seamless encryption


Manage devices anywhere

ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs nor any firewall exceptions. Management is handled by utilizing HTTPS internet connectivity making it extremely simple for businesses of any size to install and setup.

Zero impact on productivity

The implementation of encryption is completely transparent for the users and requires no action on their part. There is no extra overhead for IT departments and no need for user training.

Fast, seamless deployment

Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup of the solution under one hour.

Use cases

PROBLEM

Businesses are in the news every single day notifying their customers that a data breach has occurred.

SOLUTION

  • Protect sensitive data with ESET Endpoint Encryption by means of full-disk encryption (FDE).
  • Protect vulnerable communications such as Remote Desktop by adding multi-factor authentication.
  • Require multi-factor authentication in order to log in to devices that contain sensitive data.
 Honda logo

protected by ESET since 2011
license prolonged 3x, enlarged 2x

 Greenpeace logo

protected by ESET since 2016
more than 4,000 mailboxes

 Canon MJ Group logo

protected by ESET since 2016
more than 14,000 endpoints

 T-Com logo

ISP security partner since 2008
2 million customer base

The ESET difference

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

No special hardware required

TPM chips are optional but not required for using Full Disk Encryption.

Fully validated

ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.

Multi-platform

Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up. No firewall exclusions or open ports are required. The encryption server can run on any Windows PC or server.

Purchase Online

Purchase a licence using our web shop or contact our sales team with your requirements

Try before you buy

Why not download a free trial license with absolutely no commitment on your side.

Supported features

  • Full disk encryption (FDE)
  • File/folder encryption
  • USB encryption
  • E-mail encryption

Looking for the complete security of your network?

Related enterprise-grade solutions

ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform
ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Multi-factor Authentication
  • Endpoint Encryption

Related products and services

Stay on top of cybersecurity news

Brought to you by awarded and recognized security researchers from ESET's 13 global R&D centers.

Corporate blog

10 simple ways to make the internet safer

Upping your personal security not only makes you safer but can help to protect others in the long run.

ESET awarded PC Mag Reader’s Choice Award for Security Suites

ESET received the highest ratings from PC Mag survey respondents in a number of categories, including overall satisfaction (9.3) and likelihood to recommend (9.4).

See more Blog / UK News categories

We Live Security blog

How costly are sweetheart swindles?

And that’s on top of the heartache experienced by the tens of thousands of people who fall for romance scams each year

Siegeware: When criminals take over your smart building

Siegeware is what you get when cybercriminals mix the concept of ransomware with building automation systems: abuse of equipment control software to threaten access to physical facilities

Are you an existing customer?

 Download others white icon

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

 Business license white icon

Renew or manage licence

Login or retrieve your password to manage your existing licences.

Need assistance?

All ESET products come with free technical support in your language.