0
The Problem with Data
• Pre-boot Protection
• Centralized Management
• Support for 3rd party Authentication
• Seamless Key sharing
• Secure user recovery
• Enforceable policies
• Extensive Reporting
• Multiple encryption algorithms
– Excellent performance
• Mandatory pre-boot authentication
– Hardened pre-boot operating system
– Single Sign-on
– Token support
– Automatic recovery
• Password recovery
– Two recovery methods
• Self Service
• Portability
– Password protected executable
to decrypt even if you don’t have
the application
– Self-extracting files
• Flexibility
• Adam
– Unique Instance
– Does not require
Schema
Modification to AD
– Allows for
Keys Application
Specific Needs
Reporting
Computer
Policies Users, Computers
and Groups/OUs
– Supports
State Replication
Active
ADAM Directory • Active Directory
– Authentication
– User Identities
– Group Policies
Symantec Endpoint Encryption 15
Administrative Roles
Network Access
Control
Results:
Device Control
Increased
Protection, Control &
Intrusion
Manageability
Prevention
Firewall
Reduced
Cost, Complexity &
Risk Exposure
AntiVirus
Single Agent, Single Console
Symantec Endpoint Encryption 18
Additional Data Loss Protection