NETWRIX ENDPOINT PROTECTOR ENFORCED ENCRYPTION
keep your data
safe with usb encryption

Extend your USB security policies to cover data-in-transit with USB encryption software

Encryption software for USB drives enhances your Device Control Policies. It replaces the need for expensive hardware-based solutions by automatically encrypting sensitive data being transferred to approved and trusted USB storage devices. Netwrix Endpoint Protector Enforced Encryption uses a FIPS 140-3 validated engine to ensure data being transferred to portable USB storage is protected from loss or theft.

Keep control of your sensitive data in transit and protect it from loss or theft

Feature Icon 0
Multi-OS coverage
Unlike BitLocker and FileVault, Netwrix Endpoint Protector Enforced Encryption is compatible across both Windows and macOS.
Feature Icon 1
Military-grade encryption
FIPS 140-3 validated encryption engine keeps data safe in the event of device loss or theft.
Feature Icon 2
Granular administrative controls
Manage access at the company level, or assign rights to users or individual computers.
How Netwrix Endpoint Protector Enforced Encryption works
If permitted by your Device Control policy, the Netwrix Endpoint Protector Enforced Encryption application is automatically pushed to the USB storage device on first use. The application then enables files to be moved and automatically places them within a password-protected, encrypted container on the storage device.

Security administrators can manage encrypted devices through the Netwrix Endpoint Protector Endpoint Protector administrative console.
Image

Multiple deployment options

Feature Icon 0
Virtual appliance
Available in VMX, PVA, OVF, OVA, XVA and VHD formats, being compatible with the most popular virtualization tools.
Feature Icon 1
Cloud services
Available for deployment in the following cloud services: Amazon Web Services (AWS), Microsoft Azure or Google Cloud Platform (GCP).
Feature Icon 2
SaaS
Reduce deployment complexity & cost. Focus more resources on identifying and mitigating risks to your sensitive data and less on maintaining the infrastructure.
FAQ Image
What is USB encryption?
USB encryption means only users with an encryption key file or password will be able to access the data stored on an encrypted flash drive. With this security measure, companies can safeguard data copied on USB portable storage devices and restrict access to it. USB encryption ensures that sensitive data stored on removable devices remains protected and eliminates the threat of data loss or data theft.
How to encrypt a USB flash drive?
There are two types of encryption options for USB flash drives: hardware-based encryption and software-based encryption. While hardware-based encryption uses a device’s built-in security, thus being tied to a specific device, with software-based encryption all devices within the organization can be protected. Authentication like a key or password is required in both cases, thus unintended third parties won’t be able to access the information on the USB drive.
Why you need USB drive encryption software?
USB storage devices are convenient for sharing and transporting data, but due to their size and portability, they are easily lost, forgotten, or stolen. Therefore, sensitive data stored on unsecured USB devices is at risk and needs to be protected. With USB encryption, companies can ensure that the sensitive data stored on these devices is useless to anyone who tries to access it without a decryption key, thus avoiding non-compliance fines, legal liabilities and reputational damage.
How Netwrix Endpoint Protector Enforced Encryption Works?
Netwrix Endpoint Protector Enforced Encryption enables IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted. The solution can be used on both macOS and Windows computers.