Features include:
Enforced encryption of all sensitive data on the drive
Configurable to include requirement for remote authentication (cloud) to open any file, limitations on which computers can be used to open files, instant data lock and wipe capability when devices are stolen
Broad range of both administrator-enabled and automatic security responses to threat conditions
Remote enforcement of password and security policy
Customizable reporting of status and device risks/conditions