Have A Question About Endpoint Encryption?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.

Have A Question About Endpoint Encryption?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.

Endpoint Encryption Reviews

Read top reviews of Endpoint Encryption solutions from the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Real User
Global IT Manager at a pharma/biotech company with 501-1,000 employees
Apr 12 2018

What is most valuable?

With this product, the performance of the database wasn't affected at all. In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product... more»

How has it helped my organization?

The improvement is from the management point of view because, when implementing database security, you don't see any improvement in performance or productivity. The purpose of the product is to give visibility to management that the heart of... more»

What needs improvement?

Maybe a better GUI platform; that would make it easier to present information to management, so I would not need to fix the data before I present it.
Real User
IT Infrastructure Analyst at a tech services company with 501-1,000 employees
Sep 28 2017

What is most valuable?

* Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM). * Use of the computer's TMP to not have to request PIN for the user. * In Windows 10 (1511) the TPM supports... more»

How has it helped my organization?

Before BitLocker we used the DELL disk protection through the BIOS. This protection is not very efficient and the user needs a PIN to unlock the computer. With BitLocker I guarantee the protection of the disk and the configuration is... more»

What needs improvement?

The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing. We have had some communication problems between Windows 10 and TMP and, in some cases, the computer does not work and we need to... more»

Have A Question About Endpoint Encryption?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
Real User
Website and EComm at a retailer with 1,001-5,000 employees
Mar 13 2017

What do you think of Microsoft BitLocker?

Understanding your responsibilities for disaster recovery at a departmental level can be difficult; IT departments are holistic entities. We deal with systems, people, security, servers and infrastructure... but we also need to think about things at a granular level so we can ready ourselves for when a terrible system failure occurs - it always will. My problem was that we needed to ensure we had a very basic form of disaster recovery for our staff who were planning an event that gave us the biggest turnover of our year. Okay, so, our staff needed to take business critical information out of the office on something they could access individually. Yes, we could have used cloud storage but the staff needed full portability and access with or without the internet. Not to make...
Real User
Operator at Halliburton
Jul 10 2017

What is most valuable?

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

How has it helped my organization?

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

What needs improvement?

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»
Real User
Operator at Halliburton
Aug 09 2017

What is most valuable?

Whole Disk Encryption is great. BitLocker runs seamlessly during boot up. I also liked that it did not conflict with Windows, most likely since it was created by the makers of Windows, Microsoft.

How has it helped my organization?

BitLocker provides the common person with great security to guard against most threats consisting of efforts by unauthorized people who try to gain access to the computer by not allowing it to boot up absent a password.

What needs improvement?

There are options which could be implemented to make it a little more like PGP Whole Disk Encryption, but given the fact BitLocker is readily available, and has no known conflicts, I think it is a great product to secure against unauthorized... more»
Consultant
Microsoft (Active Directory) Consultant at a logistics company with 5,001-10,000 employees
Mar 19 2018

What is most valuable?

All keys stored centerally in database (SQL), option to have PIN / Enhanced PIN / USB Drives.

How has it helped my organization?

I delivered three projects where the business does not have any encryption mechanism in place if the company or an employee lost any of the device, there are chances someone could view sensitive data. After the Microsoft BitLocker... more»

What needs improvement?

Microsoft Bitlocker Administration and Monitoring (MBAM) is one of the best solution available in the marekt to protect corporate data
Real User
Infrastructure Specialist at a healthcare company with 1,001-5,000 employees
Jul 25 2017

What do you think of Microsoft BitLocker?

Valuable Features It is integrated with the hardware, via use of TPM It is also integrated with the Windows operating system and thus: It is free! • Improvements to My Organization Protects employee and enterprise data in case of loss of a laptop. Fills in part of an enterprise-wide security strategy. • Room for Improvement Remote management (e.g., enable/disable, reset, etc.) of PIN codes and recovery keys would be a nice feature. • Use of Solution I've used this solution for more than five years. • Stability Issues No, very few issues. • Scalability Issues No, it is a very light feature towards infrastructure requirements. Having an AD infrastructure is sufficient. • Customer Service and Technical Support Good. • Previous Solutions No. •...
Real User
System Administrator at a tech vendor with 501-1,000 employees
Nov 16 2017

What do you think of WinMagic SecureDoc?

Valuable Features The Central Management server. • Improvements to My Organization Provides DLP and security of all company data on workstations. • Room for Improvement MacOS X is missing features. OS X High Sierra is still not supported. • Use of Solution 11 months. • Deployment Issues We had issues with deployment on legacy-formatted drives so make sure you know how your drives are formatted. The vendor does not recommend using legacy-formatted drives. • Stability Issues We had issues at my organization with certain workstations still on Legacy BIOS formatted drives. It is highly recommended to use UEFI/GPT with this product, especially on anything after Windows 7. • Scalability Issues No, we have roughly 1,000 workstations, but a single server supports...
Consultant
Solution Sales Specialist at a tech services company with 5,001-10,000 employees
Feb 25 2018

What is most valuable?

Real-time threat prevention using sandboxing, file trajectory, and retrospective security. On the prevention side, AMP has nine engines. New feature AMP Visibility (beta) is an IR orchestration tool, where the local AMP for Endpoint... more»

How has it helped my organization?

Provides enhanced security, lowering IT risks, and IT operational costs by integrating with Cisco NGFW, network security and email security.

What needs improvement?

It does not include: * Encryption * Decryption of local file shares * Disks and URL filtering are done by separate product.

Have A Question About Endpoint Encryption?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
100
Solution Sales Specialist
Als netwerk specialist geef ik advies over veilige digitale netwerk architecturen ter ondersteuning van uw moderne werkplek en (hybrid) cloud. Verlaag uw IT kosten en verhoog uw productiviteit. Een goed functionerend netwerk is van belang voor elke server, storage, end user device en business... more>>
893
IT Administrator
Systems Admin.

Sign Up with Email