Symantec Endpoint Encryption Overview

Symantec Endpoint Encryption is the #4 ranked solution in our list of top Endpoint Encryption tools. It is most often compared to Microsoft BitLocker: Symantec Endpoint Encryption vs Microsoft BitLocker

What is Symantec Endpoint Encryption?
Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.

Symantec Endpoint Encryption is also known as Symantec Drive Encryption.

Symantec Endpoint Encryption Buyer's Guide

Download the Symantec Endpoint Encryption Buyer's Guide including reviews and more. Updated: May 2021

Symantec Endpoint Encryption Customers
Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
Symantec Endpoint Encryption Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
IT Operations Manager at a tech services company with 10,001+ employees
Real User
The stability and scalability are good

What is our primary use case?

The primary use case is for protecting accounts.

What is most valuable?

Protecting accounts.

What needs improvement?

We would like some advanced security protection features.

What do I think about the stability of the solution?

The stability has been good, so far.

What do I think about the scalability of the solution?

The scalability is good.

How are customer service and technical support?

The technical support is good.

How was the initial setup?

The initial support was straightforward.

What was our ROI?

The solution has helped to increase staff productivity.

What other advice do I have?

It is a good product.
Security Subdirector at a government with 11-50 employees
Real User
It has reduced the number of incidents related to the loss of information

What is our primary use case?

The primary use case is to protect from data loss prevention in my company.

Pros and Cons

  • "It has reduced the number of incidents related to the loss of information."
  • "It's a bit difficult to get good support. Their response times are really bad."

What other advice do I have?

Try to look at many vendors. There are a lot of papers about solutions, especially this one. So, it's really nice. I started my security program four years ago, and we now have a mature security program. We added this solution as the last part of our security program.
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
512,221 professionals have used our research since 2012.
Information System Security Manager at a aerospace/defense firm with 10,001+ employees
Real User
Helps us put antivirus solutions in place and prevent malware from infecting our machines

What is our primary use case?

We use it to patch information systems.

Pros and Cons

  • "It helps us put antivirus solutions in place and prevent malware from getting to our machines."
  • "I can only patch monthly. I don't know what the solution is there, besides being vulnerable for three weeks out of four. But there's got to be an option somehow."

What other advice do I have?

If you make the investment in tech, in updated hardware and software, there are other tools - here we are at RSA 2019, those tools are all over the place. There are other tools that are not single-point solutions. You can solve a whole lot of problems for a lot less money if you're using updated hardware and software rather than old stuff, end-of-life, where you just have one other thing that you have to take care of it. You can put an umbrella over everything with a bigger, newer, better product. But you have to have your hardware and software up to date, rather than the situation that my…
Senior Security Analyst at a tech vendor with 11-50 employees
Real User
We can handle remote people very easily with it

What is our primary use case?

The primary use case is just endpoint protection. It is the basis of our whole infrastructure for security staff.

Pros and Cons

  • "The management console gives us the ability to quickly control who sees what, ensures we are on the latest version, and up-to-date."
  • "I would like them to have integration with a wider range of non-Symantec products."

What other advice do I have?

Give it a serious look. Our security team is more on the immature side rather than the mature side, as we build thing out. This automated solution puts us at the base level where we can get better. We went from not being happy with what we had to this product.
Consultant at a tech company with 10,001+ employees
Master Boot Record (MBR) Corruption and PGP Whole Disk Encryption (WDE)
Today is a big deadline in work. The point when weeks of work move from development to production (via numerous sprints/releases to UAT). The culmination of the development team and my efforts over the last two months. As with most IT projects the last two weeks have been a bit fraught, testing us as we prepare to launch a new suite of Cognos reports. Today is also the day my Thinkpad has decided to corrupt its master boot record (MBR). Preventing my laptop from loading its operating system. Thankfully Microsoft (and third parties) provide bootable utilities to repair MBRs. However………… Master Boot Record Corrupt. FAIL! My MBR failure is complicated by IBM (sensibly) requiring us to use Symantec’s PGP Whole Disk Encryption (WDE). PGP’s WDE protects our laptops, and any sensitive…
Architect at a tech company with 10,001+ employees
Quick comparison of disk performance before and after full disk encryption
The following measurements were taken with a Lenovo Thinkpad W500 with 8Gb ram & running Windows 7 SP1+fixes. The CPU is a 2.5 Ghz core duo. Whilst not intending to do a thorough controlled test, I thought it would be interesting to see what the effect of Symantec PGP encryption might be on I/O performance Here’s my SSD before encryption And here’s the same afterwards Write speed has roughly been quartered whilst read speed is a little over half Given this is an SSD the overall throughput is still decent, though this came with a significant increase in CPU – in fact this is now the limiting factor it seems, with the “System” (ie kernel) showing maxed out CPU whilst previously this CPU wasn’t noticeably high With the hard drive the before…