Symantec Endpoint Encryption Overview

Symantec Endpoint Encryption is the #4 ranked solution in our list of top Endpoint Encryption tools. It is most often compared to Microsoft BitLocker: Symantec Endpoint Encryption vs Microsoft BitLocker

What is Symantec Endpoint Encryption?
Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.

Symantec Endpoint Encryption is also known as Symantec Drive Encryption.

Symantec Endpoint Encryption Buyer's Guide

Download the Symantec Endpoint Encryption Buyer's Guide including reviews and more. Updated: May 2021

Symantec Endpoint Encryption Customers
Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
Symantec Endpoint Encryption Video

Pricing Advice

What users are saying about Symantec Endpoint Encryption pricing:
  • "Depending on how many modules you will use (up to five) the licensing will be more expensive."
  • "They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options."
  • "The pricing is fair but there is variability in our area that needs to be addressed."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
OB
System Administraor at a tech services company with 11-50 employees
Real User
Has good messaging features but the hard drive encryption needs to be improved

What is our primary use case?

We are using three of the product's modules. We are using encryption for messaging, we are using encryption for shared folders and we are using encryption for our hard drives.

Pros and Cons

  • "The most valuable features are the messaging features and shared folders."
  • "The program's disk encryption is not very friendly with Microsoft OS updates. We have a problem with updates failing unless we use a time-consuming work-around."

What other advice do I have?

My advice to others who are considering this solution is to make sure that they do some testing if they are using disk encryption as we have had problems with updates. Our problem may depend on the version of Windows. So it may be different for other people. I didn't choose to use encryption before, so I learned a lot about the performance and the principle of encryption when it comes to messaging and share folders. So that part is good. On a scale from one to ten where one is the worst and ten is the best, I would rate Symantec Endpoint Encryption as a six currently. The main problem for us…
Marbella Ibarra
CEO at CT AMERICA
Reseller
Top 5Leaderboard
Stable, secure, and works as per our expectations

What is our primary use case?

Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails. We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid… more »

Pros and Cons

  • "In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
  • "There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."

What other advice do I have?

I would advise others to be aware of their requirements and about the complexity that they need to adopt. Sometimes people want to have all the information encrypted, but they are not clear about what encryption means. In the case of hard disk encryption, some users don't like to enter an additional password for encryption. They have to enter a password before Windows start, which many users don't like. Therefore, we have to bring some awareness to them and explain the necessity to have another point of control to open their hard disk. So, the main advice would be to be clear about what…
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
512,711 professionals have used our research since 2012.
PS
CTO at a tech vendor with 51-200 employees
Real User
Top 20
Great protection, perfect for large scale deployments, and low maintenance

What is our primary use case?

We primarily use the solution for endpoint security.

Pros and Cons

  • "The solution is great for large-scale deployments."
  • "The solution does slow down the device a little bit, once it's installed."

What other advice do I have?

We only use the solution on our own endpoints for our own company and don't necessarily deploy it for clients. There are a lot of companies in India who are promoting these types of products. They may have quite a good idea about the packages and so on, what you can do, what you can't do and so on. Everyone seems well educated on it. It is not a very complicated solution. It's basically solid. You don't need that much technical support. Whether it's Symantec or TrendMicro or AVG or any other package it's all pretty self-sustaining. You'll simply notice it when you have a compromise, at which…
HM
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
Top 5
Good performance for encryption that keeps your data secure and confidential

What is our primary use case?

We are using this solution to be compliant with CSP. After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform. For the Swift operation, we acquired this solution for the servers and the Endpoints. We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data. This is a pilot project, deployed to be tested. After all of… more »

Pros and Cons

  • "We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
  • "If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution."

What other advice do I have?

Checkpoint has better support. With Symantec, we have subsidiaries involved. The performance is good and it's efficient. I would rate this solution a nine out of ten.
KW
Project Engineer (Engineer II) at a energy/utilities company with 1,001-5,000 employees
Real User
Top 5
Stable, but has a complex setup and it needs to offer seamless switching

Pros and Cons

  • "The solution is pretty stable."
  • "The initial setup is a bit complex."

What other advice do I have?

We are a customer and end-user. I'm not sure which version of the solution I'm using. It's not the latest one. I understand the latest one will be able to go page Windows - which we also partnered with. The problem is not all our machines are on the latest version. We are looking to see if we switch to the latest one. In a few years, Microsoft will likely change to a new version again. Then we will be having the same problem again. It's best to align with Microsoft so that we do not have to do so many changes. Not catching up with Windows is also a risk currently due to the Microsoft Edge…
Mohamed-Hashem
Project Manager at Target IS
Real User
Versatile, all-in-one, centralized enterprise solution that understands and has a good sense of enterprise requirements

What is our primary use case?

Our primary use is implementing the solution for our clients. We are an official partner for Symantec and implement it for clients but we are also using that same solution. Most of the clients are on-premises installations although we do have some clients using cloud and hybrid-cloud deployments. So between our clients and their usage, we have experience with representatives who are using all the server deployment types. But the vast majority still stay with the on-premises deployment. This is especially true for banking customers who have stricter requirements for regulatory compliance.

Pros and Cons

  • "This product is a solid, all-in-one solution for enterprise data management."
  • "The instability of the company and lack of presence in the Middle East is affecting product use."

What other advice do I have?

On a scale from one to ten where one is the worst and ten is the best, I would rate Symantec Endpoint Encryption as an eight out of ten. There is room for improvement and I think they need to make more effort here, but I would still totally recommend Symantec products and I'm a fan of Endpoint Encryption as a mature solution.
AS
Project Manager at a tech services company with 51-200 employees
Real User
Can be managed from a central point and is stable

Pros and Cons

  • "I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
  • "What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."

What other advice do I have?

I'm in Nigeria, and we also serve Ghana, Sierra Leone, Kenya, and a bit of South Africa. Whenever you're deploying security solutions such as Symantec Endpoint Encryption, there has to be a lot more focus on sensitizing the people who are going to be affected. We train the IT staff on how to manage it, but we don't train the end-users on what it involves and the advantages of the solution. We also don't inform them of the changes they may have to make in terms of their behavior, how they access data, how they use the data, etc. We need to let them know that it doesn't mean that they are…
Mayur Jadhav
Senior Security Consultant at a tech services company with 201-500 employees
Real User
Top 5Leaderboard
Effective cloud ransomware and malware protection

What is our primary use case?

The primary use case of this solution is for endpoint Security for the Government of the Ministries that we are employed in.

Pros and Cons

  • "Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective."
  • "I think that they should improve the on-premises version to include the manageability and simplicity that is available on the cloud."

What other advice do I have?

I would recommend cloud implementation, rather than on-premises if it is possible. The on-premises deployment model will lead you to have errors. I would rate this solution an eight out of ten.
See 6 more Symantec Endpoint Encryption Reviews
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.