Cisco AMP for Endpoints Competitors and Alternatives

Read reviews of Cisco AMP for Endpoints competitors and alternatives
Real User
Infrastructure Specialist at a healthcare company with 1,001-5,000 employees
Jul 25 2017

What do you think of Microsoft BitLocker?

Valuable Features It is integrated with the hardware, via use of TPM It is also integrated with the Windows operating system and thus: It is free! • Improvements to My Organization Protects employee and enterprise data in case of loss of a laptop. Fills in part of an enterprise-wide security strategy. • Room for Improvement Remote management (e.g., enable/disable, reset, etc.) of PIN codes and recovery keys would be a nice feature. • Use of Solution I've used this solution for more than five years. • Stability Issues No, very few issues. • Scalability Issues No, it is a very light feature towards infrastructure requirements. Having an AD infrastructure is sufficient. • Customer Service and Technical Support Good. • Previous Solutions No. •...
Real User
Global IT Manager at a pharma/biotech company with 501-1,000 employees
Apr 12 2018

What is most valuable?

With this product, the performance of the database wasn't affected at all. In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product... more»

How has it helped my organization?

The improvement is from the management point of view because, when implementing database security, you don't see any improvement in performance or productivity. The purpose of the product is to give visibility to management that the heart of... more»

What needs improvement?

Maybe a better GUI platform; that would make it easier to present information to management, so I would not need to fix the data before I present it.
Real User
Operator at Halliburton
Jul 10 2017

What is most valuable?

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

How has it helped my organization?

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

What needs improvement?

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»

Sign Up with Email