Simple And Powerful Encryption - ESET

1y ago
21 Views
2 Downloads
967.75 KB
16 Pages
Last View : 3d ago
Last Download : 3m ago
Upload by : Giovanna Wyche
Transcription

SOLUTION OVERVIEWSimple and powerful encryptionfor organizations of all sizes

What isan EndpointEncryptionproduct?Endpoint encryption is an essential tool fordata security, providing encryption of filesand disks on the organization’s endpointdevices. This prevents the data from beingreadable and misused, should they fall inthe wrong hands.ESET Endpoint Encryption is a simple-to-useencryption for companies large and small,which supports full disk encryption (FDE), file/folder encryption, email encryption and USBencryption.

Why EndpointEncryption?DATA BREACHESCOMPLIANCEToday’s cybersecurity landscape has an increasingWhen it comes to compliance, most businesses firstnumber of data breaches happening every day. Whenneed to understand whether they have to meet athese breaches occur if encryption is not implemented,compliance or not. Next, they have to review whatthen the data is at risk of being released to the publicrequirements the compliance recommends andor utilized for malicious purposes. Some companiesmandates that their business implement. When itmay choose to not care about the release of data, butcomes to encryption, many regulations and laws, suchall companies have sensitive data such as customeras GDPR, PCI-DSS, HIPAA, SOX and GLBA, require thatlists, proprietary information, sales-related data, staffit be implemented.and HR information.Endpoint encryption is no longer an optional solutionBy implementing an encryption solution, businessesfor most businesses that handle credit cards ormake it impossible for hackers to read the data thathealth information, but rather a required solution. Allmay have been stolen. The top industries for databusinesses should do research and evaluate if theybreaches are traditionally ones that have valuableneed to abide by certain compliances.data such as financial, retail, healthcare and the publicsector. However, that does not mean that otherindustries are safe—just that hackers typically weigheffort required versus the payoff.REMOTE EMPLOYEESRemote employees or traveling users have become thenorm of most businesses. Employees are now workingout of coffee shops or, due to travel, working fromairports. However, the more remote employees thatyou have the higher the risk of lost or stolen devices.Not only do businesses need to worry about simply lostor stolen devices, they need to think about the processof terminating remote users.Unlike with other products, with ESET EndpointEncryption you can disable a remote employee’s laptopwithin seconds of their connection to the internet,without the need to wait for them to connect to theVPN or the corporate network.

The more remoteEndpoint encryption isemployees that youno longer an optionalhave the higher thesolution for mostrisk of lost or stolenbusinesses who handledevices.credit cards or healthinformation, but rathera required solution.

The ESETdifferenceMANAGE DEVICES ANYWHEREUSER-PROOF REMOVABLE MEDIAESET Endpoint Encryption can manage devicesanywhere in the world without requiring VPNs orany firewall exceptions. Management is handled byutilizing HTTPS internet connectivity via a proxy. Thiseliminates the need for risky incoming connections,making management of encryption safe and simple forbusinesses of all sizes. All client and server connectionsare SSL encrypted and all commands and data are endto-end AES or RSA encrypted.Management of removable media devices in a secureenvironment can sometimes be a hassle. ESET EndpointEncryption protects drives of all sizes in seconds,creating an encrypted space which grows and shrinks asrequired. This means that any writable device is safe touse, user-owned devices are not locked for their privateuse, and whitelisting is not necessary. In addition,no shared passwords are required, which keeps itextremely simple for end-users and trouble-free foradministrators.ZERO IMPACT ON PRODUCTIVITYThe implementation of encryption is completelytransparent for the users and requires no actionon their part, increasing their compliance. No extraoverhead is created for either IT departments or users,and there’s no need for user training.UNIQUE ENCRYPTION KEY SYSTEMUsing centrally managed, shared encryption keys avoidsproblems encountered by encryption solutions, whichtypically use either shared passwords or public keys.The system used by ESET Endpoint Encryption mirrorsthe way that physical keys are used to lock our houses,apartments, cars, etc. Staff already understand thisconcept, and it only needs explaining once. Coupledwith a premium remote-management system, sharedencryption keys are both highly secure and practical.REMOTELY DISABLE DEVICESMore companies are moving to a mobile workforcewhere employees not only work at airports or at homebut also at coffee shops. Due to this, businesses needpeace of mind and the ability to remotely disable or lockout devices in case the device is lost or stolen.ESET Endpoint Encryption provides a simple way to dothis without the use of open, incoming Firewall ports,VPN access and critically, without any user interaction.If connected to a WiFi network, the laptop can haveencryption keys wiped and be locked from the Windowslogin screen, with status reported back silently.The shared encryption key system used by ESET EndpointEncryption mirrors the way that physical keys are usedto lock our houses, apartments, cars, etc. Staff alreadyunderstand this concept, and it only needs explaining once.

Encryptionserver proxyWeb browseradmin interfaceorEncryptionserverClient endpoint withESET Endpoint EncryptionHTTPS, secured connectionHTTP, LANThe management of endpoints via server proxy requires no incoming connections, making it extremely safe and easy to set up.No firewall exclusions or open ports are required.The encryption server can run on any Windows PC or server. All communication between the Encryption server and clientendpoints is encrypted with 256bit AES or RSA 1024 meaning that the Encryption server proxy only holds transient, encrypteddata packets with an anonymized index and no encryption keys.

Server installationComplete setup of theof ESET Endpointsolution typically lastsEncryption usuallyless than an hour. Thistakes less thansignificantly speeds up10 minutes.the time to adoptionacross the entireorganization.

Use casesPrevent databreachesManage remoteemployeesUSE CASEUSE CASEBusinesses are in the news every single day notifyingtheir customers that a data breach has occurred.Companies need the ability to protect sensitive data inthe case of employee termination or when devices arelost or stolen.SOLUTION Protect sensitive data with ESET EndpointEncryption by means of full disk encryption (FDE).SOLUTION Restrict access to company resources by leveragingmulti-factor authentication. Protect vulnerable communications such as RemoteDesktop by adding multi-factor authentication. Utilize the remote lock-out functionality to protectdevices that may be lost or stolen. Require multi-factor authentication in order to log into devices that contain sensitive data.RECOMMENDED ESET SOLUTIONS Leverage the ability to remove users from remotedevices in order to protect data in the case ofemployee terminations. ESET Endpoint EncryptionRECOMMENDED ESET SOLUTIONS ESET Secure Authentication ESET Endpoint Encryption ESET Secure Authentication“As a service provider and working to service-levelagreements, it is reassuring that we can recommend,procure, commission and support an encryption solutionwhich helps keep continuity across Staffordshireeducational establishments, reducing overall costs.”Andy Arnold, CS Team Leader of System Solutions,Staffordshire Learning Technologies (SLT), UK

Prevent dataleakageUSE CASEEvery company utilizes removable media devices tomove data from one computer to another, but mostcompanies do not have a way to verify that the data isstaying only on company devices.SOLUTION Implement user-proof removable media to restrictthe moving of data outside of the company. Restrict access to removable media devices toselected users.RECOMMENDED ESET SOLUTIONS ESET Endpoint Encryption“The pilot was set up in a real-time environment andwe found the solution be extremely user-friendly, withits web-based interface. The server was very good,even allowing control of devices over the internet,independent of network or directory structure.”Simon Goulding, Aster’s Network Services Analyst, UK

ESET EndpointEncryptiontechnical featuresENCRYPTION TYPES SUPPORTEDNO SERVER REQUIREDFull disk encryption (FDE), file/folder encryption, USBencryption and email encryption are all supportedfeatures.ESET Endpoint Encryption requires no server to utilize,and can seamlessly support encryption for remoteusers.FULLY VALIDATEDENCRYPT EMAIL & ATTACHMENTSESET Endpoint Encryption is FIPS 140-2 validated with256-bit AES encryption.Easily send and receive encrypted emails andattachments through Outlook.ALGORITHMS & STANDARDSTEXT & CLIPBOARD ENCRYPTIONAES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA1024 bit, Triple DES 112 bit, Blowfish 128 bit.Encrypt all or part of a text window—web-browsers,database memo-fields or web-mail.OS SUPPORTCENTRALIZED MANAGEMENTSupport for Microsoft Windows 10, 8, 8.1 includingUEFI and GPT, 7, Vista, XP SP 3; Microsoft WindowsServer 2003-2012; Apple iOS.Full control of licensing and software features, securitypolicy and encryption keys.NO SPECIAL HARDWARE REQUIREDTPM chips are optional but not required for using fulldisk encryption.VIRTUAL DISKS & ENCRYPTEDARCHIVESCreate a secure, encrypted volume on your PC or inanother location or an encrypted copy of an entiredirectory tree and its files.All companies have sensitive data such ascustomer lists, proprietary information andsales-related data.

About ESETESET – a global leader in informationcomprehensive protection againstsecurity – has been named as aevolving cybersecurity threats forChallenger in the 2019 Gartner Magicbusinesses and consumers worldwide.Quadrant for Endpoint ProtectionPlatforms* two years in a row.ESET is privately owned. With no debtsand no loans, we have the freedom to doFor more than 30 years, ESET has beenwhat needs to be done for the ultimatedeveloping industry-leading IT securityprotection of all our customers.software and services, delivering instant,ESET IN NUMBERS110m 400k usersworldwidebusinesscustomers200 countries &territoriesESET EMPLOYEES13global R&DcentersESET REVENUEin million More than a third of allESET employees work inResearch & 801987199720072018* Gartner Inc, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Lawrence Pingree, Dionisio Zumerle, PrateekBhajanka, Paul Webber, August 20, 2019. Gartner does not endorse any vendor, product or service depicted in its research publications.Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements offact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability orfitness for a particular purpose.

SOME OF OUR CUSTOMERSprotected by ESET since 2017protected by ESET since 2016more than 14,000 endpointsmore than 9.000 endpointsprotected by ESET since 2016ISP security partner since 2008more than 4,000 mailboxes2 million customer baseSOME OF OUR TOP AWARDS“Given the good features for both anti-malwareand manageability, and the global reach ofcustomers and support, ESET should be on theshortlist for consideration in enterprise RFPs foranti-malware solutions.”KuppingerCole Leadership CompassEnterprise Endpoint Security: Anti-Malware Solutions, 2018

Full disk encryption (FDE), file/folder encryption, USB encryption and email encryption are all supported features. FULLY VALIDATED ESET Endpoint Encryption is FIPS 140-2 validated with 256-bit AES encryption. ALGORITHMS & STANDARDS AES 256 bit, AES 128 bit, SHA 256 bit, SHA1 160 bit, RSA 1024 bit, Triple DES 112 bit, Blowfish 128 bit. OS SUPPORT Support for Microsoft Windows 10, 8, 8.1 .

Related Documents:

ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the following pages for benefits and features of the products that are color-coded in grey.

The ESET Shared Local Cache boosts performance in virtualized environments by eliminating the need to scan duplicate files. Each file is scanned once and stored in the share cache. ESET Shared Local Cache (ESLC) records files declared clean by the Anti-virus scanner (represented by ESET Endpoint Security, ESET Endpoint Antivirus or ESET File .

ESET MOBILE SECURITY ESET, spol. s r.o. ESET Mobile Security is ontwikkeld door ESET, spol. s r.o. Ga voor meer informatie naar www.eset.com. Alle rechten voorbehouden. Niets uit deze documentatie mag worden verveelvoudigd, opgeslagen in een systeem voor het ophalen van gegevens of overgedragen, in enige vorm of op enige wijze, hetzij elektronisch,

ESET Endpoint Security 6, ESET Endpoint Antivirus 6 Update of Virus Signature Database or Modules ESET introduces Resume failed download functionality. When an update of Virus Signature Database or update of Modules is interrupted, new ESET Endpoint solutions will resume the failed down

ESET Antispam Spam tvoří až 80 procent veškeré e-mailové komunikace. Modul antispam takové zprávy filtruje. ESET Anti-Theft ESET Anti-Theft zvyšuje bezpečnost dat uživatele ve chvíli ztráty nebo zcizení počítače. Po nainstalovaní ESET Smart Security a aktivaci ESET Anti-Theft bude zařízení monitorováno.

ESET Endpoint Protection Standard provides essential protection for the company network that is easily manageable from a single console. ESET Endpoint Protection Advanced In addition to ESET Endpoint Protection Standard, the Advanced version comes with the powerful Web Control, Firewall and Anti-Spam

unauthorized users. This paper defines endpoint encryption, describes the differences between disk encryption and file encryption, details how disk encryption and removable media encryption work, and addresses recovery mechanisms. What is Endpoint Encryption? When it comes to encrypting data, there are various encryption strategies.

Ratio 104 121 143 165 195 231 273 319 377 473 559 649 731 841 1003 1247 1479 1849 2065 2537 3045 3481 4437 5133 6177 7569 50 Hz 60 Hz 13.9 12.0 10.1 8.79 7.44 6.28 5.31 4.55 3.85 3.07 2.59 2.23 1.98 1.72 1.45 1.16 0.98 0.754 0.702 0.572 0.476 0.417 0.327 0.282 0.235 0.192