Are you from this Company?
ESET Endpoint Encryption
Bratislava, Slovakia
1987
$500MN to $1BN
Enterprise
84 Likes
61 Buyers Negotiating

ESET Endpoint Encryption USP

ESET specializes in endpoint security, server security, and remote management. The company’s endpoint security portfolio includes products such as endpoint protection, data encryption, mobile and table protection, and two-factor authentication. ESET offers encryption for hard disks, removable media, files, and emails. The company’s data encryption portfolio is handled by its subsidiary, DESlock and is based on the FIPS 140-2 validated 256-bit AES encryption. The company offers encryption for both client and server sides. The client side uses the MSI package for security and compliance management. The server side takes care of management and encryption enforcement on workstations from remote locations. Request ESET Endpoint Encryption Pricing to get more information.

Summary

ESET provides DESlock encryption products under different licenses. The company offers DESlock+ Mobile, DESlock+ Essential, DESlock+ Standard, and DESlock+ Pro. DESlock+ Mobile offers fast encryption for emails, files, and text on mobile devices. DESlock+ Mobile is supported by the patented remote central management system, which efficiently manages the users, workstations, mobile devices, and encryption keys. DESlock+ Essential Edition provides email encryption, file and folder encryption, and centralized management of encryption keys. DESlock+ Essential Edition is exclusively offered for ESET’s customers and is bundled with features, such as secure collaboration, file and folder encryption, outlook add-in, text and clipboard encryption, virtual disks and compressed archives, and centralized management compatibility. The DESlock+ Standard Edition includes all the features of DESlock+ Essential Edition and is bundled with additional features, such as removable media encryption, DLP Go Portable Encryption, and support for Microsoft terminal services. DESlock+ Pro is ESET’s platinum-level product incorporating features, such as full disk encryption, removable media encryption, DLP Go Portable Encryption, file and folder encryption, outlook add-in, text and clipboard encryption, virtual disks and compressed archives, centralized management compatibility, mobile email, file, and text encryption, and support for Microsoft terminal services. The benefits of DESlock+ Pro include device theft protection; CD, DVD, and USB storage protection; files and folders protection; and secure collaboration.

Discussions

1
Add Requirements
Added Requirements
“I am looking for a Encryption Software in north America. My budget is $50,000. Looking to buy in 15 days.”
2
Select Vendors
ESET Endpoint Encryption
61 Buyers Negotiating
3
Send Requirement
Get Vendors & Experts Response To Each Requirement Within Hours.
Requirements submitted successfully.
ops! Something went wrong. Please try again later.
Discussions (1)
Buyer
Gaurav Kumar's requirement
29/11/2021
"We are a company of 5 to 10 employees. we are trying to get ISO 27001 certification for information security of our data. "
Like
Comment
Strengths
  • +12
    Professional Services
  • +14
    Support and Maintenance
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +7
    Large Enterprises
  • +14
    Directly
  • +9
    On-Premise
  • +5
    Through Partners / Third-Party Vendors
  • +11
    Communication Encryption (Voice email, and message)
  • +13
    Data Encryption
  • +14
    Data Loss Prevention
  • +8
    Disk Encryption
  • +9
    File/Folder Encryption
  • +8
    SMEs
  • +12
    Data-at-rest encryption
  • +11
    Data-in-motion encryption
  • +5
    File level encryption
  • +14
    Virtual machine instance encryption
  • +13
    Managed Services
Cautions
  • -10
    Customer Redressal Mechanism/Program
  • -9
    Level of Support
  • -5
    Consulting Service
  • -6
    Training and education
  • -10
    Patented inhouse algorithm
  • -10
    IaaS
  • -9
    PaaS
  • -8
    SaaS
  • -10
    Cloud
  • -12
    Cloud Encryption
  • -10
    Database and Application Encryption
  • -6
    Key Management
  • -5
    Tokenization
  • -7
    Others
  • -6
    Application-level encryption
  • -8
    Application-level tokenization
  • -7
    Column-level encryption
  • -13
    Data-in- process/use encryption
  • -11
    Others (RSA, Blowfish, DES)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup