Endpoint Encryption

Endpoint encryption protects data at different network endpoints such as devices, hardware, and files, and authorizes endpoints at which data can be accessed. Sensitive data is so widely deployed across enterprises that administrators must ensure it isn’t compromised. Employees access company accounts on multiple devices, and if data isn’t encrypted at those endpoints, it’s available to non-authorized viewers.

Endpoint encryption software helps manage endpoint security by monitoring endpoints, assisting with encryption key management, and authorizing devices. Encryption key management stores and backs up encryption keys, providing added security for an organization’s encryption procedures.

Endpoint encryption can be deployed as both full-disk encryption and file encryption. Full disk encryption, or whole drive encryption, encrypts the entire computer drive, securing it from all but the intended user, who must authenticate themselves. File encryption locks specific files for transfer or storage so that file can be protected on the endpoint and while being transferred to different points, whether that’s a server or an employee personal device.

Endpoint security

Endpoint security is the broader category of endpoint protection that includes encryption as well as threat detection and response. Endpoint security solutions can monitor endpoints for concerning activity and report and troubleshoot security breaches or issues. The solutions should be able to alert users to threats and provide advanced analysis on a hacker’s activity. Endpoint security is managed from one main server, but also runs security software on individual devices.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...