We just raised a $30M Series A: Read our story

Symantec Endpoint Encryption Alternatives and Competitors

Get our free report covering Microsoft, McAfee, ESET, and other competitors of Symantec Endpoint Encryption. Updated: October 2021.
542,823 professionals have used our research since 2012.

Read reviews of Symantec Endpoint Encryption alternatives and competitors

AA
Presales Manager at a tech services company with 201-500 employees
Real User
Top 20
Gives accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss

Pros and Cons

  • "With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution."
  • "The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs."

What is our primary use case?

We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution.  

Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home.  

Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.  

What is most valuable?

Often the customers have requirements where we need to provide them with endpoint DLP (Data Loss Prevention) solutions. McAfee's DLP is a very good product. It gives you accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss. This is what I think is the most valuable feature in the solution.  

What needs improvement?

The improvement that I think most needs to be addressed is a claim from many customers that I receive all the time. They say that the product consumes too much RAM and CPU. It makes clones in the machine and that eats up resources.  

It makes the clone as long as it is running on the machine. The problem is big enough for users that I need to have another smart, reliable solution that can be deployed instead if the customer does not have the hardware to allow the product to consume the needed volume of RAM and CPU. If McAfee were able to do all it does without stealing so much of the resources on a machine, I would not have this problem of having to consider other deployments.  

For how long have I used the solution?

We have been using the solution for between six or seven years. Earlier it was called VSP. At that time it was not complete all-in-one protection. It has been only for maybe two or three years they have changed the name to Complete Data Protection and made this well-integrated product.  

What do I think about the stability of the solution?

From my point of view, the product is very stable and the support team is very responsive. If they release a new update and there was a bug or something, they release a patch or fix for it very quickly.  

What do I think about the scalability of the solution?

The scalability of the solution is there. McAfee is one of the oldest security companies. They have been creating and releasing security solutions since 1987, so they know what they are doing and they do it well.  

We deploy the solution to medium and enterprise clients so it can scale up and handle larger clients.  

How are customer service and technical support?

Essentially, as a service delivery partner, we are also technical support to some level.  

Which solution did I use previously and why did I switch?

Because we deploy for clients, we work with a variety of solutions in order to meet their needs. While I am working mostly with McAfee solutions, I'm also very familiar with the broader classification of security solutions. I have worked with various PAM (Privileged Access Management) solutions. I don't only work with McAfee portfolio or their security products but it is what I deploy most often. I am familiar with Symantec, LogRhythm SIEM solution, and Forcepoint. Also, I have worked with security solutions for USB, for the web, for email, and for secure file transfer solutions, so I am very familiar with a lot of security solutions and how they work.  

The main difference between McAfee Complete Data Protection and other solutions is that McAfee has a strong point as a comprehensive security solution. With Endpoint Security, you don't have to have different management interfaces to manage your endpoint solutions. It all can be managed from one single server in one interface. This might be their main and most powerful advantage because users do not have to mix and matching various products to accomplish what a security suite can. They also do not have to deal with potential incompatibilities.  

How was the initial setup?

The initial setup is something I have done often so it is very clear how to do it and it is easy for me.  

On average it takes very little time to deploy. For the management console EPO (ePolicy Orchestrator) it is a maximum of maybe half an hour for it to be deployed. It depends on the server. Deploying the endpoint from the management console also does not take much time. If the network and the firewall ports are open, normally it takes only 5 to 10 minutes and you can deploy it in batches of 50 or 100 machines in each batch. So the total time depends on how many batches, but the installation on the machines can take as little as 5 to 10 minutes.   

What about the implementation team?

We do all of our own implementations and the implementations for clients as well.  

What other advice do I have?

The advice I have for people considering this type of security solution is not to listen to what all the companies advertise. You can see bad reviews, maybe good reviews as well, but you need to use that information from the reviews as a starting point for your own observations and not just believe what reviews say. I know some reviews on the internet are fair, but some reviews are not. Try to do a POC (Proof of concept) and conduct testing for yourself. Define your policies as per your requirements for your situation and your company and choose products that meet the needs of that model. If you want to install any solution with the default policies, it will probably not fit your requirements exactly. You will need to do enhancements and fine-tune the solution, so you will need a solution that can be tuned. Give the solutions a try. Do the POC for one or two months and then you can decide if it is a good solution for you.  

On a scale from one to ten where one is the worst and ten is the best, I would rate this product as an eight of ten. To make it ten or even a nine, they need to resolve the issues with how the solution consumes PC resources.  

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
JM
ICT operations and security manager
Real User
Top 20
Free, native to OS, and doesn't require any maintenance, but can have better user profiles to allow people to create their own passwords

Pros and Cons

  • "It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked."
  • "User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."

What is our primary use case?

We encrypt devices and disks that have the potential to be taken off-site, such as laptops, tablets, USB sticks, and USB disks. Basically, we encrypt any medium that has to be taken off-site. If we're giving out a USB stick to somebody, it is BitLocker encrypted. If somebody has to use a memory stick, the only way it gets out is if it is encrypted. 

We use the version that is native to an operating system.

What is most valuable?

It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked.

What needs improvement?

User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever.

For how long have I used the solution?

I have been using this solution for six or seven years.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It doesn't really need to scale. You use it as you need it and manage it with group policies. 

How are customer service and technical support?

There is no need for support.

Which solution did I use previously and why did I switch?

We've used a few different disk encryption products, and we've kind of settled on BitLocker because it is native to the operating system. It is simple, and there is no maintenance on it.

We also use Symantec at the moment, but we are retiring Symantec. We had trouble getting all the machines back into the office to change the disk encryption. We have a few left with Symantec. With Symantec, the version that we had was pretty old, and I wasn't sure if it would actually even work with some of the later builds of Windows 10. In terms of maintenance, with Symantec, every time there is a new build of Windows 10, you either have to defer the update while they update with Symantec, or you can install it and hope for the best. It is not a very satisfactory situation where you might have to wait six months before you can go up onto the latest build of Windows.

How was the initial setup?

It wasn't complex. It just took me a while to figure it out and make it do what I wanted it to do. Everything is documented, and you just follow the documentation.

It is deployed on all new computers, and it is part of the build. It doesn't take very long. It takes only 10 or 15 minutes. While the disk is encrypting, you can do other things.

What about the implementation team?

I deployed it on some of the computers. BitLocker is maintained as part of the operating system. If there are any updates to Bitlocker, they come out as operating system updates.

What's my experience with pricing, setup cost, and licensing?

It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker.

What other advice do I have?

I would recommend this solution. It is quick and neat, and it does the trick.

I would rate Microsoft BitLocker a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
MK
System Organizer at ceformt
Real User
Top 20
A stable solution with good support that assists us with GDPR compliance

Pros and Cons

  • "The most valuable feature is that everything is done on the server."
  • "Sometimes the server console is very slow, so the performance could be improved."

What is our primary use case?

We have many projects that contain personal and confidential data that we have to protect. When we perform searches, we need to have the data encrypted because it protects our clients. It is also part of the GDPR compliance.

What is most valuable?

The most valuable feature is that everything is done on the server. When we send data to our clients, they cannot do anything that we do not allow.

What needs improvement?

Sometimes the server console is very slow, so the performance could be improved.

The documentation is in need of improvement.

Scalability needs to be improved because we have a lot of computers and it is affecting us.

A lot of spam emails still get through, so I think that this is an area that can be improved.

There is a bug with the licensing that has been a problem for at least a couple of years, which is something that they need to fix.

For how long have I used the solution?

We have been using ESET Endpoint Encryption for the past four or five years.

What do I think about the stability of the solution?

This solution is very stable.

What do I think about the scalability of the solution?

With respect to scalability, this is something that ESET needs to improve. We have a lot of computers operating both onsite and offsite, and things such as the licensing are a problem for us. We have approximately 50 users.

How are customer service and technical support?

The technical support is very good. They are responsive and fast.

Which solution did I use previously and why did I switch?

We were using Symantec Endpoint Protection prior to using ESET.

How was the initial setup?

My understanding is that the setup was not too complex. The solution was deployed in about two days.

What about the implementation team?

One of our administrators took care of the implementation.

One or two people are required for maintenance.

Which other solutions did I evaluate?

We evaluated many different solutions before settling on ESET.

What other advice do I have?

My advice to anybody who is implementing this solution is to have a good knowledge of what it is that you want to do. If all of the policies have been decided with respect to what you want to allow, and what you do not want to allow, then it will be easy to deploy this solution on all of the clients.

With any product, there is always something that can be improved.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Jay Bodiwala
Customer Support Engineer at a tech services company with 11-50 employees
Real User
Top 20Leaderboard
Beneficial system scanning, effective malware detection, but memory intensive

Pros and Cons

  • "The malware protection and the scanning features are most valuable in this solution."
  • "There are times that this solution takes up too much memory that needs to be resolved. If it is not fixed it will definitely create issues in the future."

What is our primary use case?

We use the solution primarily for email scanning.

What is most valuable?

The malware protection and the scanning features are most valuable in this solution.

What needs improvement?

There are times that this solution takes up too much memory that needs to be resolved. If it is not fixed it will definitely create issues in the future.

In an upcoming release, there should be more reports on the health status of the systems that we could fix, such as memory health, CPU utilization, and CPU health. These types of additions would be a great help.

For how long have I used the solution?

I have been using the solution for approximately six months.

What do I think about the stability of the solution?

I have found the solution to be stable.

What do I think about the scalability of the solution?

The solution has been scalable. Most of my clients are enterprise-size organizations using this solution.

How are customer service and technical support?

Since I have been using the solution I have not had any errors or any issues I would need to contact support about.

Which solution did I use previously and why did I switch?

I have used Trend Micro and Symantec antivirus previously. We have had a lot of issues with Trend Micro antivirus. We were facing so many issues related to the support and integration with some applications. There were times when applications would stop running. The solution also took up too many resources that were impacting the system's performance which is why we needed to move on from that particular antivirus.

What's my experience with pricing, setup cost, and licensing?

It would be great if the price of the solution was lower than the current price. If we are to sell this particular solution to smaller businesses and not just enterprise businesses, it needs to be lower.

What other advice do I have?

I rate Sophos SafeGuard a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
HH
Presales Engineer at a tech services company with 11-50 employees
Real User
Offers good inspection and the detection of malware but needs better support

Pros and Cons

  • "Overall, I think that it's very interesting."
  • "In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."

What is most valuable?

Over the course of the time I have been using Trend Micro, I would say it is similar to Kaspersky. Overall, I think that it's very interesting, but I wasn't really impressed with the threat protection. For example the threat in the League of Legends for the Cloud.

What needs improvement?

In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.

I would like to see next-gen anti-virus included in the next release.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year now.

What do I think about the stability of the solution?

For the inspection and the detection of malware, it is almost the same as Kaspersky or Symantec. We know they have a module for the use-pack for the malware, to defend from the pack, and I think it's good.

I have been infected with ransomware that they should catch, and if we get infected it must be learning for it to know it is malware. It's just a weakness. It's not so good for catching ransomware. It's someone in Indonesia. The problem is why we're always with the ransomware.

What other advice do I have?

On a scale of one to ten I would rate Trend Micro Endpoint Encryption a six.

In Indonesia, with our client/our partner, I am hands-on with this solution. Trend Micro, Kaspersky, Symantec, they're all the same. They're really the same technical approach and signature base. It's totally the same for me.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Get our free report covering Microsoft, McAfee, ESET, and other competitors of Symantec Endpoint Encryption. Updated: October 2021.
542,823 professionals have used our research since 2012.