We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is that everything is done on the server."
"This solution can be centrally managed."
"The initial setup is easy."
"The usability is the most valuable feature."
"The most valuable feature is the simplicity and integration with the Microsoft Clouds platform."
"The solution works the way it's supposed to - stability and scalability are fine."
"It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us."
"There's a lot of manageability within the solution. This is very helpful."
"It's my understanding that the initial setup is straightforward."
"We have not seen any bugs or glitches, so the stability is good."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"The ease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable."
"Integration with central management needs improvement."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"Sometimes the server console is very slow, so the performance could be improved."
"I would like to see better compatibility with mobile devices."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"The visualization could be better."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"Lacks a portal that can be managed rather than just existing."
"At the end of it all, we are looking for something that can be easier to manage."
"The console GUI could be better."
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"Licensing costs are on a yearly basis."
"The pricing is mid-ranged and could be more cost-effective."
"The price of this solution should be more competitive."
"It's not about pricing, because we are working with Enterprise companies that already have Windows Enterprise, so BitLocker comes already included as a Windows feature. It's free for Enterprise users. The price is only for deployment. The customer will pay for McAfee, however."
"It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
"BitLocker is included in our license and doesn't cost us anything extra."
"I don't know the costs. In terms of Microsoft licensing, we are at E3 on the business, and we're in the process of pricing out and moving to E5. So, a lot of this is included within our licensing agreements."
"The cost of this solution is bundled in with part of the subscription for the Microsoft Cloud. We have users subscribed to Enterprise E5 and it comes with E5"
ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.
BitLocker is Microsoft's full disk encryption solution, which protects all of your data from theft, hacking or loss. BitLocker does this by encrypting the entire drive that hosts your Windows operating system and all your data.
BitLocker is available for all devices, including portable storage devices (such as external hard drives and USB flash drives). These portable devices are supported by a feature called BitLocker To Go, which is included in Windows 7 and 8, and in Windows Server 2008 R2 and Windows Server 2012. In Windows XP, encrypted devices can be read, but not written to, using the BitLocker To Go Reader program.
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 4 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 13 reviews. ESET Endpoint Encryption is rated 8.6, while Microsoft BitLocker is rated 7.4. The top reviewer of ESET Endpoint Encryption writes "A stable solution with good support that assists us with GDPR compliance". On the other hand, the top reviewer of Microsoft BitLocker writes "Brings us in compliance, works with our Microsoft tools, and is pretty simple to deploy". ESET Endpoint Encryption is most compared with Symantec Endpoint Encryption, Cisco Secure Endpoint, Sophos SafeGuard, Check Point Full Disk Encryption Software Blade and Trend Micro Endpoint Encryption, whereas Microsoft BitLocker is most compared with McAfee Complete Data Protection, Symantec Endpoint Encryption, Sophos SafeGuard, Trend Micro Endpoint Encryption and Vormetric Data Security Platform. See our ESET Endpoint Encryption vs. Microsoft BitLocker report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.