Endpoint Encryption Features

Read what people say are the most valuable features of the solutions they use.
Hassan-Moussafir says in a Symantec Endpoint Encryption review
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
The most valuable feature of this solution is encryption. The reporting is very important for us. It's a well-known solution and the PGP Solution is a good solution with good performance. Symantec has SONAR for the antivirus and ransomware behavioral analysis in the endpoints. View full review »
Service Security Specialist
The antivirus is the solution's most valuable feature. The interface is very good. You can create and manage your own dashboard. The reporting is very good. View full review »
reviewer1181427 says in a Sophos SafeGuard review
IT Network Engineer at a tech services company with 11-50 employees
The solution's most valuable feature is that it is very secure. View full review »
Network Support Engineer at a energy/utilities company with 11-50 employees
The most valuable feature of this solution is Data Loss Prevention. There is progression. It's quite amazing! In the configuration, you can restrict a user from accessing a removable drive. They can bring in malware from external sources into the network without it coming from the internet. It could come from a memory stick. With the Data Loss Prevention, we can check for this and we can stop them from being able to use a flash drive or pin drive on their computer. You can stop them from having access to a CD so that the company information cannot be lost to malware. They can't access anything, because as soon as they insert a memory stick it tells them to stop. The company is also trying to prevent any data, or files from being copied. With this feature, you can configure it to not allow any copying. If anyone inserts a memory stick, we get a report alerting us on the server of where the threat is coming from or who is trying to bypass or change the rule. Another valuable feature is the McAfee ePO, which is the centralized monitoring tool. You can have your computers on the network and this feature will tell you who is behind in terms of updates from the server. You can also view the modules that have been installed on a particular workstation. View full review »
Senior Security Consultant at a tech services company with 51-200 employees
Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective. View full review »
Marc-Kamel says in a Sophos SafeGuard review
Presales Manager at provad
This solution allows us to easily manage devices from Sophos Central cloud. Policy deployment is easy and quick to do. This solution integrates well with the antivirus solution. View full review »
Chavara-Matekwe says in a Sophos SafeGuard review
Engineer at a tech services company with 11-50 employees
The reporting and file encryption are the solution's most valuable features. The user experience and the quality of the features are good. View full review »
BocarKane says in a Sophos SafeGuard review
IT Manager at a comms service provider with 11-50 employees
The most valuable feature is the cloud-based supervision that is offered by Sophos Central. The performance of this solution is good. The monitoring features are easy to use. View full review »
MehboobKhakhi says in a Sophos SafeGuard review
IT Specialist at a non-tech company with 51-200 employees
The solution offers very good performance. The user interface is simple, It makes it very easy to use. View full review »
MohamedAhmed2 says in a Sophos SafeGuard review
Technical Team Lead at Andalusia Hai Aljamea Hospital
Sophos SafeGuard has one of the most perfect advantages, which is the data keys for encryption. This solution uses an agent, and the agent is talking with many operating systems. It encrypts on the cloud and on the hard disk. Even if you want to create it with login access before the Windows boot, it is working for the booting process and you can encrypt files on the mobile and use its agent also. The features that I have found most valuable are encryption tools that encrypt the hard disk and the USB sticks. The data that is moved and the data at rest need to be encrypted. They are not using the booting encryption because it creates heavy processing on the work station, and that delays the work. Instead, they have chosen to encrypt files that are in transit, or that are in rest only. View full review »
JonathanChawatama says in a McAfee Complete Data Protection review
IT Security Consultant at ZOL Zimbabwe
The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints. View full review »
MohamedAhmed1 says in a Sophos SafeGuard review
Technical Team Lead at Gateworx
The most valuable features of the solution are the fact that they are able to encrypt the hard disk and to encrypt USB sticks. View full review »
Imtiaz Hussain says in a Symantec Endpoint Encryption review
Malware Hunter and Incident Responder at Computer Network Systems
The encryption feature is very good. As we're just in the testing phase, we haven't explored many other features in-depth yet. View full review »
reviewer1141653 says in a McAfee Complete Data Protection review
Senior Trusted Advisor LoB Banking at a tech services company with 10,001+ employees
I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job. View full review »
Manager IT at OTE
With this solution, the device control is more reliable and more stable. We even use it for our email policies, but we are mainly using it in our environment for device protection policies. We are controlling almost all types of devices, like USB and CD-ROM devices, imaging devices, and even cameras. So we are basically able to control everything in our environment. View full review »
Anatolii Konstantynov says in a McAfee Complete Data Protection review
Project Engineer at ISSP
All features in this solution are valuable, but it depends on its function. It is capable of acting as Web control, Device Control, or Data Control. View full review »
Oche Ankeli says in a Sophos SafeGuard review
Head of IT at Digital Oak Ltd
I use all the features. they're all excellent. One of the aspects of the solution that I like the most is the fact that I can control my peripherals without having to use it for part of the application. With Sophos, I only need to generate the password and give that to a user to be able to allow them to log in to the admin page of the Endpoint and do whatever they need to do. The user cannot go ahead and uninstall it. It's kept us much more secure because of this. Should any event happen on a particular system, I'm given the username and the system IP address. I get notifications and can deal with issues right away. View full review »
BilelRadaoui says in a Sophos SafeGuard review
Project Manager at a tech services company with 11-50 employees
The Intercept X feature is the most valuable feature. You can't find this feature in other firewalls because Intercept X works as if it has an interaction between the endpoint and the firewall. It makes a connection between the endpoint protection and the firewall. If Intercept X finds some behavior that's not right, it separates it and it secures the network to defend it from this attack. This is a good feature and development that Sophos implemented around five years ago. View full review »
Ernesto Martinez says in a Digital Guardian review
Principal Consultant at a tech services company with 51-200 employees
What our customers find most valuable in Digital Guardian is the rule sets that they have for data classification. They are already set up to search for PII data, which is basically the personal identifying information for our customers. So you can quickly use their classification engine, or rule set, to set up inspection rules to determine whether data has PII, like social security numbers, date of birth, addresses and things like that. View full review »
Murad Gurbanov says in a Digital Guardian review
Presales Specialist at bc solutions
Digital Guardian has cloud correlation servers which give you visibility. Works like EDR and the correlation servers are like a perfect instrument for security analysts. The agent is a powerful thing because it is powered on the kernel site. You can control applications and data flow. You can use it with EDR solutions. View full review »
Senior Security Analyst at a tech vendor with 11-50 employees
The management console: Being able to quickly control who sees what, ensures we are on the latest version, and up-to-date. We now have visibility on our metrics. View full review »
TeamLeadb7c3 says in an ESET Endpoint Encryption review
Team Leader at a university with 201-500 employees
The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator. View full review »
Security Subdirector at a government with 11-50 employees
The precision that it has to identify all my assets. View full review »
Information System Security Manager at a aerospace/defense firm with 10,001+ employees
It helps us put antivirus solutions in place and prevent malware from getting to our machines. It's a pretty clear-cut solution. View full review »
IT Operations Manager at a tech services company with 10,001+ employees
Protecting accounts. View full review »
Sign Up with Email