381

Symantec Endpoint Encryption Device Control (v. 8.0) - license + 1 Year Bas

Mfg. Part: LHY4WZF0BI1EA | CDW Part: 2454089 | UNSPSC: 43233203
Request PricingCall
 

This item was discontinued on June 20, 2017.

Sales Assistance

800.800.4239 Mon-Fri 7am-7:30pm CT

Answer within 24 hours.



Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
800.800.4239
Mon-Fri 7am-7:30pm CT
  • (v. 8.0)
  • license + 1 Year Basic Maintenance
  • 1 device
  • Symantec Buying Programs : Express
  • level A (1-24)
  • Win
View More
Product Overview
Main Features
  • (v. 8.0)
  • license + 1 Year Basic Maintenance
  • 1 device
  • Symantec Buying Programs : Express
  • level A (1-24)
  • Win
Preventing the unauthorized transfer of sensitive data to portable media is a critical component of a complete enterprise endpoint data protection strategy. Symantec Endpoint Encryption Device Control provides this protection, monitoring and restricting device usage and file transfer activity.

Endpoint Encryption Device Control addresses this need by providing safeguards such as monitoring device usage and file transfer activity, controlling access to ports, devices and wireless networks, and restricting users' ability to copy protected classes of information. It delivers this protection coupled with the flexibility and best-in-class enterprise manageability that organizations need.

Endpoint Encryption Device Control maximizes use of existing infrastructure and training investments. It makes it easy to assess exposure to data leakage from portable devices with comprehensive auditing, alerting, and reporting. Granular, policy based controls integrated with directory services then enable flexible, appropriate, restrictions that support legitimate business activity while protecting data.

Endpoint Encryption Device Control enables data protection management in combination with other Symantec Endpoint Encryption and PGP encryption products for complete policy-based management. It also provides protection against malware, viruses, keyloggers and other potentially malicious intrusions that could compromise data and systems with controls for autorun, U3 smart drives and selfexecuting code.

 
Adding to Cart...
6/27/2017 9:52:51 AM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.