Secure data encryption

DESlock+ Data Encryption

Data encryption for files on hard drives, portable devices and sent via email.

Contact sales

Data encryption

Save up to 35% on secure data encryption. Learn more >

DESlock+ is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires minimal user interaction,increasing user compliance and the security of your company data.

  • Safely encrypt hard drives, removable media, files and email
  • FIPS 140-2 Validated 256 bit AES encryption for assured security
  • Hybrid-cloud based management server for full remote control of endpoint encryption keys and security policy
  • Support for Microsoft® Windows® 10, 8, 8.1 including UEFI and GPT
Compliance regulations

Protect one of your most valuable assets: your data

Anti-Theft lets you track, locate and remotely erase a lost or stolen mobile device.

Prepare for criminal hacking attempts or employee mistakes such as careless password practices by using encryption to keep company, client and customer data secure.                                                                             

Identity Theft and Anti-Phishing

Protect confidential data and intellectual property on laptops, mobile devices and removable media in case of loss or theft by making the data they contain unreadable to unauthorized users.

Improve regulatory and industry compliance postures:  DESlock+ meets regulatory compliance requirements for a variety of industries with advanced encryption algorithms. For HIPAA, secure encryption provides safe harbor in case of breach.

Improved Security

Extend protection beyond your network perimeter: Encryption secures data during emailing and should also be used to encrypt data before it’s posted to the cloud

Client Side

Meet client-side data security compliance obligations

Full Disk Encryption

Full disk encryption uses FIPS 140-2, level 1 validated, 256-bit AES. Allows remote user recovery in case log-in details are forgotten or workstation is locked.      

Removable media encryption doesn’t require extra space for encrypted content, so entire device capacity is available to the user. Protects USB (flash) drives, hard drives, CD/DVD and optical media.

File Folder Encryption

File and folder encryption allows you to instantly encrypt only the files and folders you choose. Perfect for protecting select data on shared workstations.

Outlook plug-in allows encryption on the spot. Emails can only be decrypted by recipients who share the same key as the sender. Text and clipboard encryption works with any email client, including webmail.

Server Side

DESlock+ Enterprise Server ensures security policy is enforced

Remote central management allows you to manage any user or workstation with a standard Internet connection. Secure connectivity allows control of endpoint encryption keys, security policy and software features inside and outside the existing security perimeter.      

Protected Remote Workforce

Supports the flexibility of having a remote or mobile workforce by extending security beyond the perimeter of the network and keeping endpoints under control at all times.

Encryption key management, a patent-pending technology, lets you add or remove  up to 64 encryption keys per user. Change the encryption policy remotely and silently, without user interaction.

With enterprise server proxy, all connections from client and server are outgoing. SSL-encrypted connections transmit data, which is encrypted using either RSA or AES cipher. No need to purchase an SSL certificate and additional hardware; no network or firewall changes required.

  • November 30 Wednesday, 2016

    AVAR 2016

    Kuala Lumpur, Malaysia

    AVAR is the largest Asia Pacific conference on anti-malware. It has been held around the region, from Korea to Australia to India, but this is the first time in that it is held in Malaysia.

  • November 9 Wednesday, 2016

    IT Nation

    Orlando, FL

    Business owners and managers, ConnectWise admins, sales, marketing, HR, finance, technicians…. IT Nation offers something for everyone. No matter what role you play in your company, you’ll leave...

  • October 27 Thursday, 2016


    San Diego, CA

    Cyber professionals, business leaders, technologists and any other interested parties are invited to join us at CyberFest2016. This annual event produced by Securing Our eCity Foundation and...

See more Videos / Webinars / White Papers

System information

Related Information

System Requirements

  • Client & Server Side:
    Microsoft® Windows® 10, 8, 8.1*, 7,  Vista, XP SP 3,
    Microsoft® Windows® Server 2003 – 2012

  • Mobile Platforms:

* Microsoft Windows RT is not supported; Full Disk Encryption requires keyboard

Certifications, Algorithms & standards

  • Certifications:
    FIPS 140-2 level 1   

  • Algorithms & standards:
    AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit
  • Works quietly behind the scenes

    "I use ESET Antivirus on my PC and Mac at home, work and traveling. It works quietly behind the scenes."

    Deborah G.M.
  • ESET: well-priced and effective

    "I’m in IT, as a support consultant. ESET products are well priced, well supported and besides using a fraction of system resources compared to other brands, they are effective."

    Dean S.
  • ESET: Everything you need

    "ESET delivers everything you need in an anti-malware package: great detection rates, small footprint and centralized management."

    Andy M., ESET business customer