Folder and USB Encryption
Protect data privacy on USB devices.
Encrypt data on USB devices and share across Unified Endpoint Management devices at the folder level with centralized key management.
Products
Unstructured Data Analytics (IDOL)
Unified Endpoint Management
Email and Social Collaboration
Data Backup and Resiliency
Content Management
Support & Services
Support
IT Professional Services
Education and Training
Academic Programs
Resources
ZENworks Endpoint Security Management protects vulnerable IT assets with location-aware, policy-based solutions. Protect the data on every PC against malware threats, and control how endpoints communicate and access information in a single console.
Enforce company policy on external, removable device types—even down to the serial number.
Works for USB, Firewire, Bluetooth, and other portable devices.
Choose not allowed, hidden, read-only, or write-only states.
Encrypt data on USB devices and share across Unified Endpoint Management devices at the folder level with centralized key management.
Policy-based Bitlocker encryption keeps your data safe.
Centralized key management to folders on fixed disks keeps sensitive data private.
Advanced anti-malware scan engine for protection against known and unknown threats, with interactive dashboards for centralized threat monitoring.
Scan for malware, viruses, trojans, worms, spyware, adware, rootkits, and more.
Policy-based management enables consistent protection no matter the device.
Precise, policy-based control over the applications running on all of your endpoints.
Protect remote workers by automatically enforcing network protection.
Dynamic security controls based on device, login, and location for endpoint protection
Robust SMAX service management foundation shortens resolution times and improves efficiencies.
Robust SMAX service management foundation shortens resolution times and improves efficiencies.
An integrated suite that delivers a complete Unified Endpoint Management solution.
Endpoint software distribution, device provisioning, policy-based controls, and more.
Identify missing patches, applicable CVEs, and automate policy-driven patch delivery.