Most Helpful Review | |
Use Dell Encryption Enterprise? Share your opinion. | |
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: January 2021. 457,459 professionals have used our research since 2012. |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs. 457,459 professionals have used our research since 2012. | |
Questions from the Community | |
Top Answer: The technical support provided by Dell EMC comes with proactive technical support. Top Answer: Some customers have less security in the solution regarding their data. We need to use multiple security applications and a set of security protocols. So security could be improved. Also, if Dell… more » Top Answer: We provide the services and the solution architecture proposing the features for our customers and clients. Most of them are using hybrid architecture. They may use their own private for the main… more » | Top Answer: It can scale from 100 to 10,000. There's no problem with the scalability. Top Answer: There are a lot of issues with the current version of the Endpoint agent. It's not stable, it's resource-consuming, and there are some performance issues. If they could improve the stability of the… more » Top Answer: Data security is now one of the most important aspects for any organization. Our customers are looking for a DLP solution that can help them protect data. It's both endpoint and network, and "network"… more » |
Ranking | |
Views 118 Comparisons 59 Reviews 1 Average Words per Review 374 Rating 9.0 | Views 5,027 Comparisons 3,277 Reviews 2 Average Words per Review 869 Rating 7.0 |
Popular Comparisons | |
![]() Compared 100% of the time. | ![]() Compared 18% of the time. ![]() Compared 12% of the time. ![]() Compared 6% of the time. ![]() Compared 6% of the time. ![]() Compared 5% of the time. |
Learn | |
Dell EMC | Digital Guardian |
Overview | |
Information Not Available | Digital Guardian Endpoint Data Loss Prevention (DLP) protects sensitive data on all your endpoints. It protects intellectual property and personal information. An endpoint agent that captures and records all system, user and data events on or off the network. It has a granular control of all data movement that can be configured to automatically block, justify or encrypt sensitive data in or attached to email, files moved to removable drives, cloud storage, or web - malware and malware-free - before sensitive data is lost. It has a built-in advanced data classification that creates and modifies classification and usage policies through content inspection, context-awareness and user classification. It provides design policies with controls that won't block actions that comply with corporate policy so employees remain productive while the data stays safe. |
Offer | |
Learn more about Dell Encryption Enterprise | Learn more about Digital Guardian |
Sample Customers | |
Information Not Available | The Fifth Avenue Theatre, Jabil Circuit |
Top Industries | |
No Data Available | Computer Software Company26% Comms Service Provider24% Financial Services Firm6% Manufacturing Company6% |
Dell Encryption Enterprise is ranked 9th in Endpoint Encryption with 1 review while Digital Guardian is ranked 6th in Endpoint Encryption with 4 reviews. Dell Encryption Enterprise is rated 9.0, while Digital Guardian is rated 7.0. The top reviewer of Dell Encryption Enterprise writes "Has remarkable support and good stability ". On the other hand, the top reviewer of Digital Guardian writes "The classification engine enables you to set up inspection rules to determine whether data has PII". Dell Encryption Enterprise is most compared with Microsoft BitLocker, whereas Digital Guardian is most compared with Forcepoint Data Loss Prevention, Symantec Data Loss Prevention, Cisco AMP for Endpoints, CrowdStrike Falcon and Carbon Black CB Defense.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.