1. /
  2. Products & Solutions/
  3. Products/
  4. Encryption Family/
  5. Drive Encryption

Symantec Drive Encryption

Full disk encryption software

Symantec Drive Encryption provides organizations with comprehensive, high performance full disk encryption for all data (user files, swap files, system files, hidden files, etc.) on desktops, laptops, and removable media. This full disk encryption software protects data from unauthorized access, providing strong security for intellectual property, customer, and partner data. Protected systems can be centrally managed by Symantec Encryption Management Server simplifying deployment, policy creation, distribution, and reporting.

Customer Success

Athens International Airport S.A.

Athens International Airport is continually innovating ensuring the 16 million passengers that travel through the major European hub every year receive a consistently reliable and secure experience. Using PGP encryption technologies from Symantec, AIA is defending confidential data throughout its operations, encrypting email messages, shared files, data on laptops, and other mobile endpoint devices.  View Story

CSR Israel

Best-in-class, integrated security and data protection all from one vendor. That is how CSR Israel sums up the value of the relationship with Symantec. The unified technologies have led to a 3-fold reduction in consumption, faster Exchange backups, and increased productivity.
 View Story

Yildiz Holding

Symantec Brightmail Gateway provides Yildiz Holding extensive antispam and antivirus protection for its incoming/outgoing emails and instant messages, plus advanced content filtering and data loss prevention technology. With a 99 percent spam filtering rate, the solution offers automatic updates, global and local IP reputation analyses, plus comprehensive reporting and administrative functions. View Story

Lansky Ganzger & Partner

Lansky, Ganzger & Partner standardized on a comprehensive array of integrated, best-in-class Symantec technologies to meet its most pressing information security challenges.  View Story

CONTACT US