This chapter describes preparation and preinstallation
               information for Trend
                  Micro™
Endpoint Encryption™ software installation.
When addressing any encryption project, it is important to identify the implementation
               goals.
               Organizations needing to satisfy explicit regulatory compliance requirements often
               require
               broad encryption solutions with a heavy emphasis on reporting, whereas organizations
               looking
               to improve data security may have more targeted needs to protect specific data assets.
No single plan can fit every use-case scenario, and understanding what is required
               of an
               encryption solution will greatly decrease deployment times, minimize or eliminate
               performance
               degradation, and ensure the project's success. Careful planning is required to understand
               the
               deployment requirements and limitations when scaling Endpoint Encryption across a large enterprise. Planning is
               especially important when introducing this change across thousands of endpoints, affecting
               all
               end-users.
		