Encryption 
 | 
- 
                                    
Protection for the full disk, including the master boot
                                        record (MBR), operating system, and all system files 
                                 
- 
                                    
Hardware-based and software-based encryption for mixed
                                        environments 
                                 
- 
                                    
Comprehensive data protection of files, folders, and
                                        removable media 
                                 
 
 | 
Authentication 
 | 
- 
                                    
Flexible authentication methods, including both single and
                                        multi-factor 
                                 
- 
                                    
Control password strength and regularity for password
                                        changes 
                                 
- 
                                    
Policy updates before authentication and system boot 
                                 
- 
                                    
Configurable actions on failed password attempt threshold 
                                 
 
 | 
Device management 
 | 
- 
                                    
Policies to protect data on endpoints and removable media 
                                 
- 
                                    
Ability to remotely lock, reset, wipe, or kill a device 
                                 
 
 | 
Central administration 
 | 
- 
                                    
Flexibly use either PolicyServer MMC or Control Manager to manage
                                            PolicyServer 
                                 
- 
                                    
Deploy Endpoint Encryption agents to
                                        endpoints already managed by OfficeScan 
                                 
- 
                                    
Enforce security policies to individual users and policy
                                        groups from a single policy server 
                                 
- 
                                    
Instantly protect end user data by sending lock or erase
                                        commands to lost or stolen Endpoint Encryption devices 
                                 
- 
                                    
Automate policy enforcement with remediation of security
                                        events 
                                 
- 
                                    
Update security policies in real-time, before authentication,
                                        to revoke user credentials before booting the operating
                                        system  
                                 
 
 | 
Record keeping, reports, and auditing 
 | 
 |