Introducing OPSWAT Threat Intelligence Similarity Search Learn More

Endpoint Encryption

Endpoint encryption protection prevents unauthorized users from accessing the data from the endpoint and is commonly used in enterprises to comply with regulations governing processing of sensitive information.

The Device Compliance Module enables discovery of hard disk encryption software on the device and provides information about the encryption. This Module leverages our patented method for assessing the encryption status of selected disks and operates independently of third-party encryption algorithms and configurations. It supports all commonly used encryption solutions.

This category enables the following actions:

Identify endpoint encryption software installed on the endpoint, together with version, vendor and marketing names.

Find out the state of the encryption process, whether the entire disk or only certain volumes are encrypted; determine the location of encrypted volumes , identify the encryption algorithm used, discover if the product supports whole disk encryption and other configuration information which can help organizations achieve regulatory compliance such as HIPAA and PCI.