ESET Endpoint Encryption Competitors and Alternatives

Read reviews of ESET Endpoint Encryption competitors and alternatives
Real User
IT Infrastructure Analyst at a tech services company with 501-1,000 employees
Sep 28 2017

What is most valuable?

* Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM). * Use of the computer's TMP to not have to request PIN for the user. * In Windows 10 (1511) the TPM supports... more»

How has it helped my organization?

Before BitLocker we used the DELL disk protection through the BIOS. This protection is not very efficient and the user needs a PIN to unlock the computer. With BitLocker I guarantee the protection of the disk and the configuration is... more»

What needs improvement?

The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing. We have had some communication problems between Windows 10 and TMP and, in some cases, the computer does not work and we need to... more»
Real User
Operator at Halliburton
Jul 10 2017

What is most valuable?

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

How has it helped my organization?

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

What needs improvement?

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»
Consultant
Solution Sales Specialist at a tech services company with 5,001-10,000 employees
Feb 25 2018

What is most valuable?

Real-time threat prevention using sandboxing, file trajectory, and retrospective security. On the prevention side, AMP has nine engines. New feature AMP Visibility (beta) is an IR orchestration tool, where the local AMP for Endpoint... more»

How has it helped my organization?

Provides enhanced security, lowering IT risks, and IT operational costs by integrating with Cisco NGFW, network security and email security.

What needs improvement?

It does not include: * Encryption * Decryption of local file shares * Disks and URL filtering are done by separate product.

Sign Up with Email