This chapter describes preparation and preinstallation
information for Trend
Micro™
Endpoint Encryption™ software installation.
When addressing any encryption project, it is important to identify the implementation
goals.
Organizations needing to satisfy explicit regulatory compliance requirements often
require
broad encryption solutions with a heavy emphasis on reporting, whereas organizations
looking
to improve data security may have more targeted needs to protect specific data assets.
No single plan can fit every use-case scenario, and understanding what is required
of an
encryption solution will greatly decrease deployment times, minimize or eliminate
performance
degradation, and ensure the project's success. Careful planning is required to understand
the
deployment requirements and limitations when scaling Endpoint Encryption across a large enterprise. Planning is
especially important when introducing this change across thousands of endpoints, affecting
all
end-users.