R&S®Trusted Disk

Full-disk encryption

R&S®Trusted Disk
Open Lightbox
R&S®Trusted Disk

Key facts

  • Full-disk encryption for endpoints and mobile devices
  • Device encryption
  • Approved for classified data
  • Available as a single-user or enterprise version
  • Centralized management

R&S®Trusted Disk

Protects your data with full-disk encryption

The most comprehensive safest method to protect your data ion endpoints is full-disk encryption. R&S®Trusted Disk prevents sensitive data from being accessed in the case of theft or loss by securely and effectively enconding hard disks.

Features & benefits

Full-disk encryption

Protect your data stored on endpoint devices

The full-disk encryption solution encrypts not only the user data, but also the entire operating system and any temporary data. R&S®Trusted Disk uses a transparent realtime encryption method that maintains the smooth running  productivity of all working stations. Pre-boot authentication by PIN or hardware tokens add a further security mechanisms.

Device encryption

Authentification mechanisms and encryption of mobile devices

R&S®Trusted Disk provides authentification methods for mobile devices such as USB sticks or external hard disks. TrustedDisk allows easy and safe use of mobile encrypted data storage media – even in mixed environments.

Approved for classified data

Highest security standards for sensitive data

R&S®Trusted Disk was developed according to the requirements of the German Federal Office for Information Security (BSI), which includes evaluated random number generation to maintain the highest security level. Via defined security profiles, individual security parameters can be defined for any client. The multilevel hardware-token authentication method ensuring unrivaled levels of security.

Single-user and enterprise version

Available for single working stations and corporate networks

R&S®Trusted Disk can be easily and quickly installed for single working stations or in corporate networks with mixed environments. Both versions require authentication via hardware token. Mult-user authorization can be configured and changed, enabling enables several users and groups to simultaneously access encrypted storage devices.

Request information

Do you have questions or need additional information? Simply fill out this form and we will get right back to you.

I want to receive information from Rohde & Schwarz via

Marketing permission

What does this mean in detail?

I agree that Rohde & Schwarz GmbH & Co. KG and the Rohde & Schwarz entity or subsidiary company mentioned in the imprint of this website, may contact me via the chosen channel (email or postal mail) for marketing and advertising purposes (e.g. information on special offers and discount promotions) related to, but not limited to, products and solutions in the fields of test and measurement, secure communications, monitoring and network testing, broadcast and media, and cybersecurity.

Your rights

This declaration of consent may be withdrawn at any time by sending an email with the subject "Unsubscribe" to news@rohde-schwarz.com. Additionally, a link to unsubscribe from future email advertisements is contained in each email sent. Further details on the use of personal data and the withdrawal procedure are set out in the Statement of Privacy.

Your request has been sent successfully. We will contact you shortly.
An error is occurred, please try it again later.
General and legal information