Unified Endpoint Management Tools

OpenText ZENworks Full Disk Encryption

Encrypt data at rest on Microsoft Windows™ endpoint devices

ZENworks Full Disk Encryption dashboard in computer and in mobile

Manage constant change across endpoints from anywhere.Read the Omdia report

Overview

A person using lap in server room

Meet your company’s data protection security requirements and key regulations without making your fleet difficult to manage with OpenText™ ZENworks Full Disk Encryption. This fixed-disk, data-at-rest encryption solution for Windows endpoint devices renders data and operating systems inaccessible to unauthorized users when the machine is turned off. Protect all your devices in the event of loss or theft without impacting the user experience.

Unified endpoint management ebook

What can OpenText ZENworks Full Disk Encryption do for you?

Protection lock shield icon

Encrypt all endpoint data

Encrypt all data or targeted partitions across disks with AES-256 encryption for both used and unused sectors. Restrict ability to decrypt drives. Keep data at rest safe.

Protect devices with preboot endpoint authentication

Require passwords or smartcard authentication to boot drives with support for UEFI-based and Linux-based preboot environments. User access can be managed centrally.

Deploy remote encryption management

Easily help users recover forgotten preboot authentication passwords. Recover encrypted data even if the encryption key has been damaged.

Ensure endpoint regulatory compliance

Enforce critical industry guidelines and government regulations for protecting customer and patient data.

With OpenText solutions underpinning our IT services, we can provide employees with everything they need to get their jobs done- and ensure that production lines keep rolling 24/7.

Klaus Dielacher
Head of Central IT Services Group Wuppermann Business Services

Why OpenText ZENworks Full Disk Encryption?

  • Comprehensive full disk encryption

    Encrypt entire hard drives to protect sensitive data, ensuring security if devices are lost or stolen.

  • Centralized device encryption management

    Manage all your encrypted devices from a single console. Remotely unlock and manage devices while keeping users productive.

  • Seamless user experience

    Encryption runs in the background so users can continue their workflows without disruption

Key features

Implement encryption that doesn’t lock IT out of its management role or slow down employee workflows. Remotely deploy policies to guarantee all hard disks containing sensitive data are encrypted, ensuring that the data remains protected if the device is lost or stolen.

FIPS 14-2 Level 2 Encryption

Deploys Federal Information Processing Standards (FIPS) 140-2 Level 2 encryption module in conjunction with OPAL-compliant hardware encryption.

Central management encryption

Equips IT managers to quickly and easily create comprehensive encryption policies to centrally manage OPAL-compliant hardware encryption and OpenText ZENworks software full disk encryption.

Device lockdown and decryption

Prevents drive decryption from occurring without administrator intervention when a Full Disk Encryption policy is removed from a device.

Transparent full disk encryption

Ensures users don’t see a difference in their experience, unless you require preboot authentication.

Firewall-friendly policy agent

Allows you to quickly and easily deliver policies to any device that can connect to the OpenText ZENworks server using a standard HTTP web connection.

Windows authentication as an alternative to preboot

Gives IT staff the option to retain Windows authentication instead of preboot authentication to secure hard drives without changing the end-user experience.

Accelerate the value of OpenText ZENworks Full Disk Encryption

Integrations

This OpenText solution integrates with:

Professional services

OpenText Professional Services combines end-to-end solution implementation with comprehensive technology services to help improve systems.

Partners

OpenText helps customers find the right solution, the right support, and the right outcome.

Training

OpenText Learning Services offers comprehensive enablement and learning programs to accelerate knowledge and skills.

Communities

Explore our OpenText communities. Connect with individuals and companies to get insight and support. Get involved in the discussion.

Premium Support

Optimize the value of your OpenText solution with dedicated experts who provide mission-critical support for your complex IT environment.

OpenText ZENworks Full Disk Encryption resources

Muskegon Family Care logo

OpenText improves security and reduces manual effort while saving infrastructure cost

Learn more
Meijer Inc logo

OpenText supports significant annual savings and six-fold increase in POS deployment

Learn more
Sauter Group logo

Sauter uses OpenText for central management of their hybrid IT infrastructure

Learn more
Helbako logo

OpenText helps free IT team from administration tasks by automation

Learn more
Ortner Ges.m.b.H logo

Market-leading organization supports communication and collaboration through OpenText

Learn more

OpenText ZENworks Endpoint Security and OpenText ZENworks Full Disk Encryption

Read the flyer

OpenText ZENworks Full Disk Encryption

Read the data sheet

MAM: The key to balancing mobile security and usability

Read the paper

OpenText ZENworks Suite

Read the flyer

What is encryption?

Learn more

OpenText ZENworks Endpoint Security and OpenText ZENworks Full Disk Encryption

Read the flyer

OpenText ZENworks Full Disk Encryption

Read the data sheet

MAM: The key to balancing mobile security and usability

Read the paper

OpenText ZENworks Suite

Read the flyer

What is encryption?

Learn more

Tracking and remediating OpenText ZenWorks Full Disk Encryption deployments

Read the blog

OpenText ZENworks Full Disk Encryption: Five frequently asked questions

Read the blog

Tracking and remediating OpenText ZenWorks Full Disk Encryption deployments

Read the blog

OpenText ZENworks Full Disk Encryption: Five frequently asked questions

Read the blog