Data Sheet

Data Sheet: Endpoint Security
Symantec Endpoint Encryption 7.0
Confidence in a connected world.
Page 2 of 4
Offers boot protection, multi-factor authentication,
pre-boot authentication and event logging
Supports Single Sign-On (SSO) to avoid the need to
remember and enter multiple passwords
Scalable, centralized management for easy deployment
and administration
Supports Microsoft® Active Directory®, Novell
eDirectory™, and non-domain endpoints
Symantec Endpoint Encryption 7.0—Removable
Storage Edition key features
Comprehensive device and media support
Scalable key management and password recovery
Microsoft Active Directory® Integrated Enterprise
Management Console
Kiosk mode that allows access to large numbers of
people without pre-registration
Multi-factor authentication for increased security
Symantec Endpoint Encryption 7.0—Full Disk Edition
key features
Pre-boot password or Smart Card–based authentication
grants only authorized individuals access to computer’s
data
Supports Single Sign-On to the network domain
Multi-factor authentication for increased security
Supports multiple users and administrators on
individual machines
Provides extensive logging of status and activity of hard
disk encryption application
Protection operates transparently to users with minimal
performance impact
Helps achieve regulatory compliance with legislation
(and standards such as PCI, SB1386, HIPAA, etc.)
Encrypts data “on-the-fly” and is transparent, with
virtually no performance degradation and requiring no
end-user training
Scalable key management and password recovery
Microsoft Active Directory® Integrated Enterprise
Management Console
Novell Windows Client on Microsoft Windows 2000 and
Windows XP Professional
Symantec Endpoint Encryption 7.0 features and
technical specifications
Pre-boot password or smartcard-based authentication
ensures only authorized individuals have access to data
Supports broad range of tokens and Smartcards,
including support for CAC v2, GSC-IS 2.1, Aladdin eToken
and RSA
Supports broad range of hardware readers, including all
CCID-compliant USB readers and PCMCIA and embedded
machine readers
Easy central deployment, administration, and
management features
Supports multiple users and administrators on
individual machines
Key sharing mechanisms that allow users to share
access to files securely
Secure user recovery without key vulnerabilities
On-the-fly file encryption for removable media