Continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination. For example, a virtual private network (VPN) uses end-to-end encryption. The HTTPS protocol encrypts Internet traffic. Contrast with zero-access encryption and link encryption. See VPN.