Contact Us
Login Free Trials
SupportWorld Live Conference
Event SupportWorld Live 2021

November 06, 2021

Meet us
Remote Work: Mobile Working from Home, at the Office, or Anywhere Else
Remote Work: The Future Of Work Is Hybrid

Matrix42 Study on New Work Models

Get the Study
Vendor Selection Matrix-Hybrid-Cloud-Service-Management-Tools
Resources Hybrid Cloud Infrastructure and Service Management

Get more out of your Hybrid Cloud

Find out more
Matrix42 Webinar with Pink Elephant: Automated Discovery, Reconciliation & Synchronization
Automated Discovery, Reconciliation & Synchronization

The Three-Legged Stool of Configuration Management

Watch the Webinar
Forrester: The Total Economic Impact™ Of Matrix42 Enterprise Service Management
Resources ROI 51% – Switching Pays Off

Forrester shows benefits when switching to Matrix42 Enterprise Service Management

Download Forrester Study
First Aid Kit to Protect Patient Data
First Aid Kit to Protect Patient Data

Protect patient data intelligently,
Automate IT Security Management

Protect patient data now
Vendor Selection Matrix™ Secure Unified Endpoint Management: THE TOP VENDORS 2021 IN DACH, BENELUX AND NORDICS
Resources Matrix42 Ranked #1 Worldwide

Vendor Selection Matrix™ Secure Unified Endpoint Management

Read more
Vendor Selection Matrix™ Enterprise Service Management (ESM): Top 10 Global Vendors 2021
Resources 1,500 IT Execs Made Their Choice!

Global IT executives selected Matrix42 as the Market Leader in Enterprise Service Management

Learn more
Automate Endpoint Security
Security & IT Operations

Give your team what they need to cross the finish line

Unleash the Power
Automated Service Processes
Get Into the Power Zone

Drive better performance and user experience across the enterprise

Get there




  • Permanent Encryption - encrypt files no matter what the medium (external storage media, network, local hard drives, cloud storage, etc.) Encrypted data remains encrypted even when transferred via other transfer channels (e.g. as an email attachment or web upload). You can easily reopen the data on third-party and mobile devices using a password or PKI token through the Mobile Encryption Component. 


  • Local Folder Encryption - protects your data in case of loss of devices and storage media, but also in case of collaborative access of several users to the same device. Sensitive data is also protected against access by employees with administrator rights.


  • Removable Device Encryption - Mobile storage devices, such as USB flash drives, are getting smaller and smaller and more powerful, making them increasingly easy to lose or steal. With Removable Device Encryption, they encrypt the files to be protected with methods that can be combined in multiple ways and ensure that the data cannot be used by unauthorized persons.


  • Android & iOS Encryption - iOS and Android devices provide file-based protection on internal storage, storage cards and cloud accounts. Decryption is done by entering a password.


  • Preboot Authentication (PBA) - the door stays closed - prevent Windows login and associated encryption from being manipulated or bypassed by starting USB/CD or replacing the operating system. In case of theft, this also prevents any bitlocker protection from being levered out during startup.