Endpoint Encryption

Endpoint encryption protects data at different network endpoints such as devices, hardware, and files, and authorizes endpoints at which data can be accessed. Sensitive data is so widely deployed across enterprises that administrators must ensure it isn’t compromised. Employees access company accounts on multiple devices, and if data isn’t encrypted at those endpoints, it’s available to non-authorized viewers.

Endpoint encryption software helps manage endpoint security by monitoring endpoints, assisting with encryption key management, and authorizing devices. Encryption key management stores and backs up encryption keys, providing added security for an organization’s encryption procedures.

Endpoint encryption can be deployed as both full-disk encryption and file encryption. Full disk encryption, or whole drive encryption, encrypts the entire computer drive, securing it from all but the intended user, who must authenticate themselves. File encryption locks specific files for transfer or storage so that file can be protected on the endpoint and while being transferred to different points, whether that’s a server or an employee personal device.

Endpoint security

Endpoint security is the broader category of endpoint protection that includes encryption as well as threat detection and response. Endpoint security solutions can monitor endpoints for concerning activity and report and troubleshoot security breaches or issues. The solutions should be able to alert users to threats and provide advanced analysis on a hacker’s activity. Endpoint security is managed from one main server, but also runs security software on individual devices.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles


Table of contents What is Software? History of Software Software vs. Hardware Software vs. Hardware Comparison Chart What Types of Software Exist? Saas vs....

Email Address

What is an Email Address? An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a...

Information Technology (IT) Architect

The information technology architect applies IT resources to meet specific business requirements. The role requires a high degree of technical expertise as well as...

Built-In Function

A built-in function is a function that is already available in a programming language, application, or another tool that can be accessed by end...


Geotargeting is a method of delivering data or content to users based on...

Agile Project Management

Agile project management enables business teams to approach their projects and tasks with...

Private 5G Network

A private 5G network is a private local area network (LAN) that utilizes...