Symantec Information Centric Encryption

Share data confidently as you move to the cloud.

Lock down access to sensitive data with combined identity, encryption, and digital rights to lock out unauthorized users, wherever your data goes.

Download the Data Sheet

Data is the New Perimeter: Protect It Wherever It Flows.

In an age of cloud apps and BYO devices, traditional security perimeters are no longer viable solutions for protecting your sensitive data.

When data leaves the managed premises potentially anyone can access it. Use identity, encryption, and rights management to secure sensitive data so only intended users gain access—no matter if they are mobile, remote, or working outside your organization.

Symantec Information Centric Encryption integrates with other Symantec data protection technologies to:

  • Accurately detect sensitive data across multiple platforms
  • Automatically encrypt data wherever it goes
  • Set users' digital rights access (such as edit, print, and save)
  • Decrypt files based on user identity; supports multifactor authentication
  • Monitor usage and revoke access at anytime

Data Gotten Out of Your Hands? Track It.

One central control for all of your data–both in and out of your network.

Track and protect sensitive data so it's always in your control. You get a clean, consolidated view across multiple data channels (email, endpoints, storage, cloud applications, and mobile) and operating systems.

  • Real-time reporting—Monitor data access, discover who has accessed files, and identify anomalous user behavior both internally and externally.
  • Revoke access—Dynamically alter file or user access for immediate protection; leave the file in place, where it remains encrypted and unusable to unauthorized users.

Read the Brief Read the White Paper

If You Can’t See It, You Can't Protect It.

Visibility is king for a successful data protection strategy. Without it, you're operating in darkness.

Gain full visibility into all your data (at rest, in use, and in motion) and automatically protect it. Integration with Symantec Data Loss Prevention (DLP) and Symantec Information Centric Tagging (ICT) delivers both content- and user-based detection.

  • Symantec Data Loss Prevention—Detects sensitive data across multiple data channels (such as endpoints, network, USB devices, email, and cloud applications). Integrate with Information Centric Encryption to automatically protect your data.

Learn more

  • Symantec Information Centric Tagging—Lets users classify data against predetermined categories. Integrate with Information Centric Encryption to manually protect your data.

Learn more

It's Your Data. Shouldn't You Control the Keys?

Have complete control over access to your data anytime, anywhere.

Our encryption technology and key management expertise safeguard your decryption keys when in use. The rest of the time, however, you host your own decryption keys—so you stay in full control.

  • Choose to host your decryption keys in the cloud or in your own on-premises key store.

Discover Our Community

View the latest product discussions in our forums.

Learn More

Need help?

Technical support and more.

Learn More

Administrator Access to ICE Cloud Console

Any system with Internet access and one of the following browsers:

  • Google Chrome 45 or higher
  • Mozilla Firefox 36 or higher
  • JavaScript must be enabled
  • Cookies must be enabled
Enterprise File Storage Solution

Enterprise Box or OneDrive account, plus:

  • For Windows: Microsoft Office 2010, 2013, or 2016
  • For macOS: Microsoft Office 2011 or 2016
Symantec ICE Utility (for Users and Administrators)
  • Windows 7 (32 and 64-bit), 8 (32 and 64-bit), or 10 (32 and 64-bit)
  • OS X Yosemite (10.10), El Capitan (10.11), or Sierra (10.12)
  • iOS 9 or higher
File Formats (Through the Symantec ICE Utility)
  • General: .txt, .rtf
  • Microsoft Word: .doc, .dotm, .dotx, .docx
  • Microsoft Excel: .xls, .xlsx, .xlsb
  • Microsoft PowerPoint: .ppt, .ppsm, .pptm, .pot, .pptx, .ppsx, .potx
  • Adobe Reader: .pdf
  • PDF files are always read-only, except for PDF form filling in Acrobat Reader.
  • Adobe Acrobat is not supported for PDF files

PURCHASING OPTIONS BUY VIA PARTNER