We performed a comparison between Microsoft Bitlocker and Symantec Endpoint Encryption based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Comparison of Results: Based on the parameters we compared, Microsoft Bitlocker seems to be a superior solution. All other things being more or less equal, half of Symantec Endpoint Encryption reviewers found Symantec Endpoint Encryption to be difficult to deploy. Additionally, users of Symantec Endpoint Encryption find it difficult to upgrade. Finally, Symantec Endpoint Encryption’s users are not impressed with its technical support.
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"You can do a silent remote deployment very fast."
"I like BitLocker because it gives us strong encryption to protect our data."
"The most valuable feature is the TPM (Trusted Platform Module), which makes the PC security stronger because somebody who is not from the team cannot access the PC without the decryption PIN."
"Microsoft BitLocker's most valuable features are stability and simplicity in terms of usage."
"Microsoft BitLocker can be used to ensure that stolen PCs or laptops do not lose their data."
"The solution has a feature that automatically asks the users to upgrade their password once we set up the process."
"Technical support is excellent."
"One notable aspect is the ability to customize alerts and other settings."
"In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
"Its management is good, and it is also scalable and mostly stable."
"The installation process is pretty straightforward."
"This product is a solid, all-in-one solution for enterprise data management."
"The solution’s installation was easy."
"We use it for protecting accounts, which is its most valuable feature."
"Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
"They can improve the security of the application and include an encryption disk in the next feature."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"The primary aspect for improvement lies in expanding our developer base, which would accelerate the development process and bring these enhancements to fruition"
"We recently found some stability issues with Microsoft BitLocker."
"There are options which could be implemented to make it a little more like PGP Whole Disk Encryption."
"I would like to be able to encrypt our cloud tenancy."
"For improvement, as it is now, I do not have any support from anyone. There should be a web interface to manage BitLocker. But for now, all I do is just install a new product on the user's machine and create it. I would like to be able to see everything that is happening, even if it is just through a web interface. I would also like to be able to see how many users are provisioned, which users are using BitLocker, and how to disable or enable it. That's what I would like to see."
"They could improve cloud integration regarding attribute and encryption key management."
"One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom."
"It was hard to install and took us about three months."
"The UI could be improved."
"The solution does slow down the device a little bit, once it's installed."
"It's a bit difficult to get good support. Their response times are really bad."
"I think that they should improve the on-premises version to include the manageability and simplicity that is available on the cloud."
"Symantec Endpoint Encryption can improve by being more secure."
"They have too high of a price tag. That's why they're losing the market share."
Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews while Symantec Endpoint Encryption is ranked 7th in Endpoint Encryption with 34 reviews. Microsoft BitLocker is rated 8.2, while Symantec Endpoint Encryption is rated 7.6. The top reviewer of Microsoft BitLocker writes "User-friendly, easy to set up, and offers real-time machine status updates". On the other hand, the top reviewer of Symantec Endpoint Encryption writes "Provides a centralized management console and a straightforward initial setup process ". Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Trend Micro Endpoint Encryption, WinMagic SecureDoc and Sophos SafeGuard, whereas Symantec Endpoint Encryption is most compared with McAfee Complete Data Protection, Cisco Secure Endpoint, Digital Guardian, WinMagic SecureDoc and ESET Endpoint Encryption. See our Microsoft BitLocker vs. Symantec Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.