Endpoint Encryption Users Have Shared Their Experience With Us

Updated March 2024

Would you like to learn about products from people using them now? Simplify your research with trusted advice from people like you.

Download our FREE Endpoint Encryption report based on 225+ real user experiences with these popular products:

...and 29 more!

Where should we email your report?






Microsoft BitLocker review

ManojNair2
ManojNair2
Founder/Director at Augesys Solutions Pvt Ltd
Encrypts fast, embedded in the OS, and is reliable
In terms of improvement, they should look at file encryption. When the files are being moved out or something, sometimes we need encryption in transit. Meaning when your system, your laptop you're using, the files are idle, then they are encrypted. And if you are sending the files out, let's say you're mailing the files out, that's data in...
McAfee Complete Data Protection review

Massimo Biccini
Massimo Biccini
Cyber Security Consultant & Presale at Innovery
Very configurable with adaptive threat protection and frequent updates
We have different business units. Each business unit performs a different activity. I work for cybersecurity and around the installation of the endpoint security product. However, we also have the red team that performs penetration tests. We also have a business unit related to the cloud infrastructure. Then there are people that are...

Since 2012, we've had 763,955 professionals use our research.

As seen in