Mobile Data Protection Features

Read what people say are the most valuable features of the solutions they use.
reviewer1181427 says in a Sophos SafeGuard review
IT Network Engineer at a tech services company with 11-50 employees
The solution's most valuable feature is that it is very secure. View full review »
Marc-Kamel says in a Sophos SafeGuard review
Presales Manager at provad
This solution allows us to easily manage devices from Sophos Central cloud. Policy deployment is easy and quick to do. This solution integrates well with the antivirus solution. View full review »
Chavara-Matekwe says in a Sophos SafeGuard review
Engineer at a tech services company with 11-50 employees
The reporting and file encryption are the solution's most valuable features. The user experience and the quality of the features are good. View full review »
BocarKane says in a Sophos SafeGuard review
IT Manager at a comms service provider with 11-50 employees
The most valuable feature is the cloud-based supervision that is offered by Sophos Central. The performance of this solution is good. The monitoring features are easy to use. View full review »
MehboobKhakhi says in a Sophos SafeGuard review
IT Specialist at a non-tech company with 51-200 employees
The solution offers very good performance. The user interface is simple, It makes it very easy to use. View full review »
MohamedAhmed2 says in a Sophos SafeGuard review
Technical Team Lead at Andalusia Hai Aljamea Hospital
Sophos SafeGuard has one of the most perfect advantages, which is the data keys for encryption. This solution uses an agent, and the agent is talking with many operating systems. It encrypts on the cloud and on the hard disk. Even if you want to create it with login access before the Windows boot, it is working for the booting process and you can encrypt files on the mobile and use its agent also. The features that I have found most valuable are encryption tools that encrypt the hard disk and the USB sticks. The data that is moved and the data at rest need to be encrypted. They are not using the booting encryption because it creates heavy processing on the work station, and that delays the work. Instead, they have chosen to encrypt files that are in transit, or that are in rest only. View full review »
MohamedAhmed1 says in a Sophos SafeGuard review
Technical Team Lead at Gateworx
The most valuable features of the solution are the fact that they are able to encrypt the hard disk and to encrypt USB sticks. View full review »
Oche Ankeli says in a Sophos SafeGuard review
Head of IT at Digital Oak Ltd
I use all the features. they're all excellent. One of the aspects of the solution that I like the most is the fact that I can control my peripherals without having to use it for part of the application. With Sophos, I only need to generate the password and give that to a user to be able to allow them to log in to the admin page of the Endpoint and do whatever they need to do. The user cannot go ahead and uninstall it. It's kept us much more secure because of this. Should any event happen on a particular system, I'm given the username and the system IP address. I get notifications and can deal with issues right away. View full review »
Muntasir Ibrahim says in a Connected MX review
ICT Vendor Specialist at Asb
The integration features are the most valuable. The integration is specific to each solution. It works well with SQL and Oracle databases and so on. View full review »
BilelRadaoui says in a Sophos SafeGuard review
Project Manager at a tech services company with 11-50 employees
The Intercept X feature is the most valuable feature. You can't find this feature in other firewalls because Intercept X works as if it has an interaction between the endpoint and the firewall. It makes a connection between the endpoint protection and the firewall. If Intercept X finds some behavior that's not right, it separates it and it secures the network to defend it from this attack. This is a good feature and development that Sophos implemented around five years ago. View full review »
Ernesto Martinez says in a Digital Guardian review
Principal Consultant at a tech services company with 51-200 employees
What our customers find most valuable in Digital Guardian is the rule sets that they have for data classification. They are already set up to search for PII data, which is basically the personal identifying information for our customers. So you can quickly use their classification engine, or rule set, to set up inspection rules to determine whether data has PII, like social security numbers, date of birth, addresses and things like that. View full review »
Murad Gurbanov says in a Digital Guardian review
Presales Specialist at bc solutions
Digital Guardian has cloud correlation servers which give you visibility. Works like EDR and the correlation servers are like a perfect instrument for security analysts. The agent is a powerful thing because it is powered on the kernel site. You can control applications and data flow. You can use it with EDR solutions. View full review »
headofop936426 says in a Microsoft BitLocker review
Head of Operations (India) at a tech vendor with 51-200 employees
* Easy to implement * AD integration * It is a totally free solution. * It is tightly integrated with Windows View full review »
AdnanRiaz says in a Microsoft BitLocker review
Microsoft (Active Directory) Consultant at a logistics company with 5,001-10,000 employees
All keys stored centerally in database (SQL), option to have PIN / Enhanced PIN / USB Drives. View full review »
Sign Up with Email