ESET® ENDPOINT ENCRYPTION PRO

Simple and powerful encryption for organizations of all sizes

Starting at $56.15 per device

110m+
users worldwide

400k+
business customers

200+
countries & territories

13
global R&D centers

ESET Endpoint Encryption Pro

Easy to use encryption application provides full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:

Checkmark icon

Zero data breaches

Checkmark icon

Compliance with requirements

Checkmark icon

Seamless encryption


Manage devices anywhere

ESET Endpoint Encryption can manage devices anywhere in the world without requiring VPNs or firewall exceptions. Management is handled by utilizing HTTPS internet connectivity, making it extremely simple for businesses of any size to install and set up.

Zero impact on productivity

Implementing encryption is completely transparent for the users and requires no action on their part. There's no extra overhead for IT departments and no need for user training.

Fast, seamless deployment

Server installation of ESET Endpoint Encryption usually takes less than 10 minutes, with complete setup in under one hour.

Use cases

PROBLEM

Businesses are in the news every single day notifying their customers that a data breach has occurred.

SOLUTION

  • Protect sensitive data with ESET Endpoint Encryption by means of full-disk encryption (FDE).
  • Protect vulnerable communications such as remote desktop by adding multi-factor authentication.
  • Require multi-factor authentication in order to log in to devices that contain sensitive data.

Protected by ESET since 2011.

Protected by ESET since 2008.

Canon logo

Protected by ESET since 2016.

T-com logo

ESET ISP security partner since 2008.

The ESET difference

No server required

ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users.

No special hardware required

TPM chips are optional but not required for using full disk encryption.

Fully validated

ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption.

Multi-platform

Encryption supported across Windows 10, 8, 8.1, 7, Vista, XP, and Server 2003 – Server 2016 and iOS.

The management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up. No firewall exclusions or open ports are required. The encryption server can run on any Windows PC or server.

ESET ENDPOINT ENCRYPTION PRO

Try before you buy

Download a free trial license with absolutely no commitment. 

Supported features

  • Full disk encryption (FDE)
  • File/folder encryption
  • USB encryption
  • E-mail encryption

Looking for additional solutions?

Related enterprise-grade solutions

ESET Identity & Data Protection solution icon

ESET Identity & Data Protection

  • Two-factor Authentication
  • Endpoint Encryption
ESET Endpoint Protection Advanced solution icon

ESET Endpoint Protection Advanced

  • Security Management Center
  • Endpoint Protection Platform

Related products and services

Stay on top of cybersecurity news

Brought to you by respected security researchers from ESET's 13 global R&D centers.

Corporate blog

RIP Windows 7

Windows 7: Time to say goodbye

On October 22, 2009, Microsoft released Windows 7, an operating system that would turn out to be a big hit among users, remaining highly popular throughout the entirety of the past decade. However,...

Christmas scam image

’Tis the season to be scammed—Our guide to a fraud-free festive season

For many, the holiday season is the most magical time of the year, but unfortunately it can also be high season for cyber criminals to strike. For this festive season, we’ve compiled a guide to some...

Webinars

Internet of fakes: Protecting against a new era of threats and scams

Wednesday, January 29, 2020

Can you spot the differences between fake and real content? What about your employees?

Cybersecurity Trends 2020: What's Coming & How to Prepare

Wednesday, Dec. 18, 2019

Get a head start with expert insights from the ESET research team, based on their upcoming 2020 cyber trends report.

We Live Security blog

Inside consumer perceptions of security and privacy in the connected home

The ESET survey polled 4,000 people to get a sense of their attitudes towards the privacy and security implications of smart home technology

Needles in a haystack: Picking unwanted UEFI components out of millions of samples

ESET experts describe how they trained a machine-learning model to recognize a handful of unwanted UEFI components within a flood of millions of harmless samples

Are you an existing customer?

Download and reinstall

Re-download your ESET software and have your license key ready to activate it.

Business license white icon

Renew or manage license

Log in or retrieve your password to manage your existing licenses.

Need assistance?

All ESET products include free technical support in your language.