Compare Dell Credant vs. WinMagic SecureDoc

Dell Credant is ranked 12th in Endpoint Encryption while WinMagic SecureDoc is ranked 9th in Endpoint Encryption. Dell Credant is rated 0, while WinMagic SecureDoc is rated 0. On the other hand, Dell Credant is most compared with Microsoft BitLocker, Symantec Endpoint Encryption and WinMagic SecureDoc, whereas WinMagic SecureDoc is most compared with Microsoft BitLocker, Symantec Endpoint Encryption and Sophos SafeGuard.
Cancel
You must select at least 2 products to compare!
Dell Credant Logo
818 views|715 comparisons
WinMagic SecureDoc Logo
2,383 views|1,517 comparisons
Ranking
12th
out of 26 in Endpoint Encryption
Views
818
Comparisons
715
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
9th
out of 26 in Endpoint Encryption
Views
2,383
Comparisons
1,517
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Find out what your peers are saying about Microsoft, Sophos, Symantec and others in Endpoint Encryption. Updated: November 2019.
382,196 professionals have used our research since 2012.
Top Comparisons
Compared 86% of the time.
Compared 7% of the time.
Also Known As
CredantSecureDoc
Learn
Dell EMC
WinMagic
Overview
CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.SecureDoc is used by some of the world's largest organizations. By simplifying data security we can help save time and reduce costs associated with security management. At the end of the day, we make data security easy.
Offer
Learn more about Dell Credant
Learn more about WinMagic SecureDoc
Sample Customers
FastMed Urgent Care, Daughters of Charity Health System (DCHS)NEC Group,Export Development Canada, SecureDoc University of Guelph, Swiss Bank, Suva (Swiss Accident Insurance), Money Partners (UK), Children's Hospital of Denver, The Hospital for Sick Children (SickKids), Arch Chemicals
Find out what your peers are saying about Microsoft, Sophos, Symantec and others in Endpoint Encryption. Updated: November 2019.
382,196 professionals have used our research since 2012.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Sign Up with Email