Symantec Information Centric Encryption
Share data confidently as you move to the cloud.
Lock down access to sensitive data with combined identity, encryption, and digital rights to lock out unauthorized users, wherever your data goes.
When data leaves the managed premises potentially anyone can access it. Use identity, encryption, and rights management to secure sensitive data so only intended users gain access—no matter if they are mobile, remote, or working outside your organization.
Symantec Information Centric Encryption integrates with other Symantec data protection technologies to:
Track and protect sensitive data so it's always in your control. You get a clean, consolidated view across multiple data channels (email, endpoints, storage, cloud applications, and mobile) and operating systems.
Gain full visibility into all your data (at rest, in use, and in motion) and automatically protect it. Integration with Symantec Data Loss Prevention (DLP) and Symantec Information Centric Tagging (ICT) delivers both content- and user-based detection.
Our encryption technology and key management expertise safeguard your decryption keys when in use. The rest of the time, however, you host your own decryption keys—so you stay in full control.
Any system with Internet access and one of the following browsers:
PURCHASING OPTIONS BUY VIA PARTNER