Endpoint Encryption

Endpoint encryption protects data at different network endpoints such as devices, hardware, and files, and authorizes endpoints at which data can be accessed. Sensitive data is so widely deployed across enterprises that administrators must ensure it isn’t compromised. Employees access company accounts on multiple devices, and if data isn’t encrypted at those endpoints, it’s available to non-authorized viewers.

Endpoint encryption software helps manage endpoint security by monitoring endpoints, assisting with encryption key management, and authorizing devices. Encryption key management stores and backs up encryption keys, providing added security for an organization’s encryption procedures.

Endpoint encryption can be deployed as both full-disk encryption and file encryption. Full disk encryption, or whole drive encryption, encrypts the entire computer drive, securing it from all but the intended user, who must authenticate themselves. File encryption locks specific files for transfer or storage so that file can be protected on the endpoint and while being transferred to different points, whether that’s a server or an employee personal device.

Endpoint security

Endpoint security is the broader category of endpoint protection that includes encryption as well as threat detection and response. Endpoint security solutions can monitor endpoints for concerning activity and report and troubleshoot security breaches or issues. The solutions should be able to alert users to threats and provide advanced analysis on a hacker’s activity. Endpoint security is managed from one main server, but also runs security software on individual devices.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...