Contact Us
Login Free Trials
SupportWorld Live Conference
Event SupportWorld Live 2021

November 06, 2021

Meet us
Remote Work: Mobile Working from Home, at the Office, or Anywhere Else
Remote Work: The Future Of Work Is Hybrid

Matrix42 Study on New Work Models

Get the Study
Vendor Selection Matrix-Hybrid-Cloud-Service-Management-Tools
Resources Hybrid Cloud Infrastructure and Service Management

Get more out of your Hybrid Cloud

Find out more
Matrix42 Webinar with Pink Elephant: Automated Discovery, Reconciliation & Synchronization
Automated Discovery, Reconciliation & Synchronization

The Three-Legged Stool of Configuration Management

Watch the Webinar
Forrester: The Total Economic Impact™ Of Matrix42 Enterprise Service Management
Resources ROI 51% – Switching Pays Off

Forrester shows benefits when switching to Matrix42 Enterprise Service Management

Download Forrester Study
First Aid Kit to Protect Patient Data
First Aid Kit to Protect Patient Data

Protect patient data intelligently,
Automate IT Security Management

Protect patient data now
Vendor Selection Matrix™ Secure Unified Endpoint Management: THE TOP VENDORS 2021 IN DACH, BENELUX AND NORDICS
Resources Matrix42 Ranked #1 Worldwide

Vendor Selection Matrix™ Secure Unified Endpoint Management

Read more
Vendor Selection Matrix™ Enterprise Service Management (ESM): Top 10 Global Vendors 2021
Resources 1,500 IT Execs Made Their Choice!

Global IT executives selected Matrix42 as the Market Leader in Enterprise Service Management

Learn more
Automate Endpoint Security
Security & IT Operations

Give your team what they need to cross the finish line

Unleash the Power
Automated Service Processes
Get Into the Power Zone

Drive better performance and user experience across the enterprise

Get there

Control with data encryption


Encryption encrypts storage media, directories, clouds, individual files or entire hard disks on-the-Fly, without loss of productivity, your users will not notice. You determine which authorized persons are granted access. With the mobile app, your data can be decrypted on external devices and in the cloud on mobile devices or external systems. Additional authentication protects encrypted hard disks when removing hardware or bypassing Windows logon. In this way, you also guarantee the protection of personal data in accordance with EU-GDPR Article 32.


  • Cloud Storage & Network Share Encryption – encrypt folders and files in cloud storage (e.g. OneDrive, GoogleDrive, Dropbox) or any network share. The encryption keys remain in your organization and are never stored in the cloud, a distinct advantage over encryption solutions offered by the cloud storage services themselves.


  • Full Disk Encryption – laptops can be lost or stolen and your sensitive data remains protected. Full Disk Encryption ensures that only authorized users have access to the device and data. Smart cards and eTokens can be used for increased security. Full Disk Encryption is FIPS 140-2 Level 1 certified and supports Advanced Encryption Standard New Instructions (AES-NI).