How Enforced Encryption works
If permitted by your Device Control policy, the Enforced Encryption application is automatically pushed to the USB storage device on first use. The application then allows files to be moved and automatically places them within a password-protected, encrypted container on the storage device.
Security administrators can manage encrypted devices through the Endpoint Protector administrative console.
Endpoint Protector Features
USB & Peripheral port control
Lockdown, monitor and manage devices. Granular control based on vendor ID, product ID, serial number and more.
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
Automatic USB encryption
Encrypt, manage and secure USB storage devices by safeguarding data in transit. Password-based, easy to use and very efficient.