We performed a comparison between Microsoft Bitlocker and Symantec Endpoint Encryption based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Comparison of Results: Based on the parameters we compared, Microsoft Bitlocker seems to be a superior solution. All other things being more or less equal, half of Symantec Endpoint Encryption reviewers found Symantec Endpoint Encryption to be difficult to deploy. Additionally, users of Symantec Endpoint Encryption find it difficult to upgrade. Finally, Symantec Endpoint Encryption’s users are not impressed with its technical support.
"Feature-wise we have the ability to encrypt fast."
"One significant aspect is that without the BitLocker key, you can't log in to the user's laptop. I appreciate the capability to encrypt the user's hard drive, ensuring access only with the recovery key. In an enterprise setup, we store all BitLocker keys on our server. So, whenever a user attempts to log in, the architecture authenticates with the key. This ensures that our data is secure. Even if the user's laptop is lost, we have confidence that the data remains inaccessible. So far, our user data is well-protected."
"We have not seen any bugs or glitches, so the stability is good."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"The best thing about it is the encryption type and the way it requires TPM when someone tries to access the drive."
"The most valuable feature is the authentication process which is very fast."
"You can do a silent remote deployment very fast."
"It comes bundled with other Microsoft solutions."
"One notable aspect is the ability to customize alerts and other settings."
"I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
"I like the solution for its encryption."
"The initial setup was easy."
"We find the dashboard, endpoint mobile encryption, and email encryption valuable."
"The solution is great for large-scale deployments."
"Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective."
"It helps us put antivirus solutions in place and prevent malware from getting to our machines."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"Technical support has not been very good."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"It needs a management console."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"They should offer better login capabilities that are more secure."
"I would recommend BitLocker only because of the economic side, not the technical side. If the features were included in the already existing licenses I would use it. If not, I would recommend other products."
"The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing."
"We would like some advanced security protection features."
"It's a bit difficult to get good support. Their response times are really bad."
"There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."
"From an administration point of view, maybe it would be ideal to have it centrally managed."
"It was hard to install and took us about three months."
"The UI could be improved."
"The instability of the company and lack of presence in the Middle East is affecting product use."
"They have too high of a price tag. That's why they're losing the market share."
Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews while Symantec Endpoint Encryption is ranked 7th in Endpoint Encryption with 34 reviews. Microsoft BitLocker is rated 8.2, while Symantec Endpoint Encryption is rated 7.6. The top reviewer of Microsoft BitLocker writes "User-friendly, easy to set up, and offers real-time machine status updates". On the other hand, the top reviewer of Symantec Endpoint Encryption writes "Provides a centralized management console and a straightforward initial setup process ". Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Trend Micro Endpoint Encryption, WinMagic SecureDoc and Sophos SafeGuard, whereas Symantec Endpoint Encryption is most compared with McAfee Complete Data Protection, Cisco Secure Endpoint, Digital Guardian, WinMagic SecureDoc and ESET Endpoint Encryption. See our Microsoft BitLocker vs. Symantec Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.