Try our new research platform with insights from 80,000+ expert users
Ibrahin Gamal - PeerSpot reviewer
IT Specialist at ITE Corp
Real User
A scalable solution useful for encryption and integration with other solutions
Pros and Cons
  • "The ease of administering and integrating the solution is great."
  • "The integration between Active Directory and BitLocker could be better."

What is our primary use case?

Our primary use case for this solution is encryption. The solution is deployed on-premises.

What is most valuable?

The ease of administering and integrating the solution is great.

What needs improvement?

The product could be improved by simplifying the implementation process and the integration between Active Directory and BitLocker could be better.

For how long have I used the solution?

We have been using this solution for two years and are currently using the latest version.

Buyer's Guide
Microsoft BitLocker
March 2025
Learn what your peers think about Microsoft BitLocker. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,592 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable. Currently, we have approximately 800 users using this solution, and six people are required for maintenance.

How are customer service and support?

We don't have experience with customer service and support.

How was the initial setup?

The initial setup is easy and takes approximately one to two days. A day for implementation and a second day for compliance.

What about the implementation team?

The solution was implemented in-house.

What's my experience with pricing, setup cost, and licensing?

We use the System Center Configuration Manager, which is free. So we don't need a license for BitLocker.

What other advice do I have?

I rate this solution an eight out of ten. The solution is good but can be improved by simplifying the implementation process. I recommend it to people who may not be able to afford high license costs.

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
reviewer1952547 - PeerSpot reviewer
Associate at a insurance company with 10,001+ employees
Real User
Top 5
Data protection and encryption solution that offers excellent customer support and performance stability
Pros and Cons
  • "Being able to encrypt an entire hard disk has been most valuable."
  • "The solution could be improved if it was more user friendly."

What is our primary use case?

We use this solution to protect our data in the event that it is stolen or a laptop goes missing. We make use of the encryption scheme.

What is most valuable?

Being able to encrypt an entire hard disk has been most valuable.

What needs improvement?

The solution could be improved if it was more user friendly. 

For how long have I used the solution?

We have been using this solution for three years.

What do I think about the stability of the solution?

This is a stable solution. 

How are customer service and support?

The customer service for this solution is excellent. I would rate it a five out of five. 

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is not difficult. You can set it up using policy levels. The pilot testing took less than one week.

What other advice do I have?

I would recommend this solution to others. The best feature is that we can secure organization data using folder encryption. 

I would rate this solution a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Microsoft BitLocker
March 2025
Learn what your peers think about Microsoft BitLocker. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,592 professionals have used our research since 2012.
PeerSpot user
Info Sec Consultant at Size 41 Digital
Real User
Top 5
Bitlocker - defence in depth

Understanding your responsibilities for disaster recovery at a departmental level can be difficult; IT departments are holistic entities. We deal with systems, people, security, servers and infrastructure... but we also need to think about things at a granular level so we can ready ourselves for when a terrible system failure occurs - it always will.

My problem was that we needed to ensure we had a very basic form of disaster recovery for our staff who were planning an event that gave us the biggest turnover of our year. Okay, so, our staff needed to take business critical information out of the office on something they could access individually. Yes, we could have used cloud storage but the staff needed full portability and access with or without the internet. Not to make a mountain out of a mole hill - USB keys.

I know. USB keys. Oddly they seem very fond of train seats and restaurant chairs because we keep hearing about them being found everywhere with private information on them.I think we're all agreed that - in the wrong hands - USB keys can be a bit of a nightmare. Of course, in the right hands they can be a nifty thing but the password must be strong enough,. It also shouldn't be able to be changed by staff.

Here we have a solution to the problem of securing drives in easy reach - Bitlocker. I literally can't think of an easier product to use. Click. Choose a couple of options or leave them as the default. Save. Done. I’m not underplaying this, it really is simple.

The aim of the game is to provide security against thefts that are spur of the moment, or people finding items that are lost; no-one wants to be the government department that loses a USB key full of people's NI numbers. We need to show due diligence in securing the storage devices that will be leaving the office.

How does it all work? 

Bitlocker uses TPM (Trusted Platform Module) but can be used without it via a small change from the sys admin of your org (probably you)

And it really is quite simple: 


It comes with a recovery key that the IT dept can keep a hold of in case the password is forgotten.To reiterate, it's included in some Windows software so free. When working for charities this is a great bonus especially if they insist on USB drives even though we all know they are a real risk to info getting out into the open. 

So, Bitlocker is designed to secure your drives (even removable ones) in an easy fashion. Does it do that? Yes, very much so. Is it easy to use? I’m not sure they could have made it easier.

 Is it secure? Secure enough from situational thieves and unskilled (in hacking) malicious current/ex-staff.

Did I find any bad points? To be honest, no. Job done. Bitlocker for securing drives, especially USB drives that leave the office. If you need something stronger then the drive probably shouldn't be leaving the office in the first place.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Darren Chaker - PeerSpot reviewer
Darren ChakerOperator at Halliburton
Top 20Real User

By Darren Chaker : I would extend full drive encryption for not only USB, but also external drives too. Simply imagine whatever data you have is lost or subject to a competitors possession, and the residual harm that would ensue. Information security must be part of the work environment, and being proactive is the only way to accomplish this.

See all 2 comments
it_user8433 - PeerSpot reviewer
Security Expert at a tech company with 10,001+ employees
Vendor
IronKey verses BitLocker-To-Go with smart cards (part 1)

This post originally appeared on the Random Oracle blog at https://randomoracle.wordpress.com/2013/03/02/ironkey-verses-bitlocker-to-go-with-smart-cards-part-1/

IronKey is one of the better known examples of “secure flash drive,” a category of products targeted at enterprises and security-conscious users for portable storage with hardware encryption. From a certain perspective, this entire category owes its existence to a failure of smart card adoption in the same target market. All of the functionality of dedicated hardware encryption products can be implemented with equal or better security, at much lower cost and greater flexibility using general purpose smart cards and off-the-shelf software.

Case in point: BitLocker-To-Go (“B2LG” for short) available in Windows 7 and later versions, provides full disk encryption for any old USB drive, with keys managed externally. B2LG is closely related to the original Bitlocker feature introduced in Vista, which protected boot volumes with the help of a trusted platform module. The latter is a more difficult proposition, as booting a modern OS involves several stages, each depending on executing code from the encrypted disk. Maintaining integrity of this code loaded during boot is as much of a concern as confidentiality, because altering the operating system can be an avenue of bypass against disk encryption. By contrast B2LG is concerned strictly with reading data after the OS has been already booted into a steady state.

Screenshot of the context menu on a removable drive
Context menu on a removable drive, showing the option to enable BitLocker

BL2G can be configured to use either passwords or smart card for encryption:

Choosing between passphrase and smart card
Choosing between passphrase and smart card, when enabling BitLocker.

The first configuration is susceptible to the usual offline guessing attacks, much like Android disk encryption, because keys are derived from a low-entropy secret chosen by the user. In the second configuration, the bulk-data encryption key is randomly and sealed using a public-key associated with the smart card. Unsealing that to recover the original key can only be done by asking the card to perform a private key operation, which is what smart cards are designed to implement with high security.

PIN dialog during private key operation
PIN dialog during private key operation to unlock a volume protected by BitLocker To Go.

Comparing a USB drive with built-in encryption with B2LG coupled to smart cards card, these solutions achieve similar but not identical, security profiles:

  • In both cases, bulk data encryption key is not derived from user-entered PIN or pass-phrase. A key based on “12345678″ is not any more likely than one based on “c8#J2*}ep
  • In both cases there is a limit to online guessing attacks by trying different PIN/password choices. For dedicated drives, the retry count is typically fixed by the manufacturer. For BL2G, it depends on the application installed on the card, translating into more flexibility.
  • BitLocker defaults to AES with 128-bit keys, along with a home-brew diffuser to emulate a wide-block cipher operating on sectors. Dedicated flash drives typically boast slightly more modern cryptography, with 256-bit AES in standardized XTS mode. (Not that any practical attacks exist against 128-bit keys or the custom diffuser. But one can imagine that manufacturers are caught in a marketing arms race: as soon as one declares support for the wider key length and starts throwing around “256″ as magic number, everyone else is required to follow suit for the sake of parity.)
  • For those comforted by external validation, there are many smart cards with FIPS 140 level 3 certification (as well as Common Criteria EAL 5+) in much the same way that many of the drives boast FIPS compliance. Again BL2G provides for greater choice here: instead of being stuck with the specific brand of tamper-resistant hardware the drive manufacturer decided to use, an enterprise or end-user can go with their own trusted card/token model.
  • BL2G has better resilience against physical theft: an attacker would have to capture the drive and the card, before they get to worrying about user PIN. If only the drive itself is lost, any data residing there can be rendered useless by destroying the cryptographic keys on the smart card. By contrast a lost IronKey is a permanent liability, just in case the attackers discover the password in the future.
  • Neither approach is resilient against local malware. If the drives are unlocked while attached to a compromised machine, all stored data is at risk. Some smart cards can support external PIN entry, in which case local malware can not observe the PIN by watching keystrokes. But this is little consolation, as malware can request the card to perform any operation while connected. Similarly while the IronKey PIN must be collected on PC and subject to interception, there are other models such as Aegis Secure Key with their own integrated PIN pad.
  • BitLocker has one convenience feature that may result in weaker configuration.  There is an option to automatically unlock drives, implemented by caching the key after successful decryption. Once cached, the smart card is no longer required to access the same drive in the future, because the key is already known. If the user makes an unwise decision to use this feature on a laptop which is stolen (or equivalently, remotely compromised) the persisted key can be used to decrypt the drive. Meanwhile the proprietary software accompanying IronKey does not provide an option to cache passwords. (That said, nothing stops a determined user from saving it to a local file.)

The second part of this post will look at other dimensions, such as performance, cost effectiveness and scaling, where BitLocker & smart card combination enjoys a decisive advantage over dedicated hardware.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Milan Turinic - PeerSpot reviewer
IT manager at Milan Turinič
Real User
Top 20
A High-Performing Solution to mitigate Unauthorized Data Access on lost or Stolen Computers
Pros and Cons
  • "It is an encryption tool and provides security."
  • "They can improve the security of the application and include an encryption disk in the next feature."

What is most valuable?

It is an encryption tool and provides security.               

What needs improvement?


They can improve the security of the application and include an encryption disk in the next feature.

For how long have I used the solution?

I have been using Microsoft BitLocker for the last two years.

What do I think about the stability of the solution?

The stability is satisfactory but I would rate it eight out of ten.

What do I think about the scalability of the solution?


I would rate the scalability of Microsoft BitLocker eight out of ten.

How are customer service and support?

I have never contacted support myself, but they are extremely well-supported.

How would you rate customer service and support?

Positive

How was the initial setup?


I am not in the admin position but the solution is easy to install.

What other advice do I have?

I would rate the overall product eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1535043 - PeerSpot reviewer
Manager - ICT at a insurance company with 51-200 employees
Real User
Free to use with Windows 10 and easy to set up but needs to be easier to manage
Pros and Cons
  • "It's my understanding that the initial setup is straightforward."
  • "At the end of it all, we are looking for something that can be easier to manage."

What is our primary use case?

We primarily use the solution for endpoint encryption.

What is most valuable?

We were using the solution due to the fact that it was free with the machines that have Windows 10. As an organization, we were not paying money to have it. If you have Windows 10 you don't have to worry about paying at all.

It's my understanding that the initial setup is straightforward.

What needs improvement?

I was looking for a better solution. It's my understanding that if you're just to generate that endpoint encryption and you just run it normally, it may not give you the actual protection you need as you don't have a centralized server.

At the end of it all, we are looking for something that can be easier to manage. Everything that you need to do manually can end up being an issue. If it's a product that can be automated, I would be happier with it. Right now, with the way it is arranged, it's a bit manual as it isn't centralized.

For how long have I used the solution?

I joined this company a year ago. I've used it just for a few months due to COVID, as we have not been using it. It's just been used for a few months; less than a year.

How are customer service and technical support?

I have not contacted technical support directly. I've mandated other team members to deal with them. On our side, the colleague who actually implemented the solution is also the point person who deals with technical issues.

He's reached out to Microsoft's technical support n the past. Last week, for example, he was engaged with them about some automation issues and about centralizing the solution.

However, due to the fact I haven't spoken with them, I can't speak to how helpful or responsive they are.

Which solution did I use previously and why did I switch?

At a previous company, I had used Symantec Endpoint Encryption.

How was the initial setup?

While I did not personally set up the solution myself, it's my understanding that the process is not overly complex. My colleague managed the process, and for them, it was quite straightforward. They didn't run into any issues. A company, in general, should be able to do it quite easily.

What's my experience with pricing, setup cost, and licensing?

The solution is completely free and available through Windows 10. We are not paying any licensing fees to use it.

What other advice do I have?

We are just a customer and an end-user. We don't have a business relationship with Microsoft.

We have not gone to a server model, like running it through a centralized location. This is due to the fact that we decided to deploy it normally through creating encryption keys and sharing those keys so that we are able to access the machine using the keys themselves.

It has not been fully loaded across the company as we are looking for solutions that can work for us as a main solution.

What I wanted us to do, whether it was via BitLocker or Symantec or whichever tool, was to have a centralized administration so that we are able to create those keys and are able to share them. We also want to be able to control them from a centralized location. That's the type of solution I'm looking for. I do not want things to be done manually. Centralized administration is very good for that.

Before I can recommend the solution, I would want to understand it fully. I'm working with my colleague to be able to understand what is its strengths and its weaknesses are. Most companies want simple tools that don't cost a lot of money. I haven't used this tool too much, and therefore can't properly evaluate it. We're currently hoping we can roll it out in a better way. That remains to be seen.

From what I have seen so far, I would rate the solution at a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Associate at IntimeSolutions
Real User
Top 5
Comes bundled with other Microsoft products, offers good encryption, and is reliable
Pros and Cons
  • "It comes bundled with other Microsoft solutions."
  • "They should offer better login capabilities that are more secure."

What is our primary use case?

This solution is for endpoint encryption. It helps us avoid data loss. 

What is most valuable?

Having encryption has been great. It's very useful. It's 256-bit encryption. It's very hard to break it to get at the data itself. 

It's stable and reliable. 

The solution can scale.

It comes bundled with other Microsoft solutions.

Technical support is okay. 

What needs improvement?

They should offer better login capabilities that are more secure. Right now, they only offer SSO. They need to offer multi-factor authentication. 

The support could be a bit faster. 

For how long have I used the solution?

I've been working with the solution for six months. 

What do I think about the stability of the solution?

The solution is very stable. 

There are no bugs or glitches, and it doesn't crash or freeze. 

What do I think about the scalability of the solution?

The solution is very scalable. It comes inside a Microsoft bundle, and if you buy a bundle big enough, one that already fits your company's needs, then it will fit your encryption needs. 

We have six clients using the solution at this time. 

How are customer service and support?

The support is pretty standard. It's fine. We have to wait one or two hours once we've created tickets. Of course, we would like them to be a bit faster.

How was the initial setup?

The initial setup is a bit complex. It works on Windows, yet it may not be compatible with other operating systems.

We deployed the solution over the last eight months. We keep getting more customers and continue to implement it. 

We also manage the solution for the clients. 

What's my experience with pricing, setup cost, and licensing?

In orer to buy ButLocker, you need to buy some other Microsoft products. It's not a standalone product. 

Typically, customers pay a monthly licensing fee.

What other advice do I have?

The product is good at protecting data. I'd rate it nine out of ten. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
System Administration Specialist at Alatau Innovations
Real User
Great support, mostly reliable, and helps with encryption
Pros and Cons
  • "Technical support is excellent."
  • "The initial setup is complex."

What is our primary use case?

We just start on BitLocker. It is a native Microsoft encryption tool.

What is most valuable?

The stability seems good when everything goes right.

Technical support is excellent.

What needs improvement?

We need to increase the data disc a bit, not all of it, as we tried to test some special software views. We had a problem with the disc. The disc may be damaged. We can lose information. This has just happened once. It’s not standard.

The initial setup is complex.

I want them to include the encryption of the data disc.

For how long have I used the solution?

We’ve used the solution for about a month. We just started to test it.

What do I think about the stability of the solution?

Aside from the one disc failure, it’s been pretty stable.

What do I think about the scalability of the solution?

I have not tested any cases in terms of scalability.

I’m not sure if there are plans to increase usage just yet.

We have a small team of 25 employees that are using it.

How are customer service and support?

I haven’t really contacted them that much, however, when I did, in June, they were exceptional. I had my questions answered in ten minutes or so. They are very quick and very helpful.

Which solution did I use previously and why did I switch?

We previously tried McAfee.

How was the initial setup?

It’s not a straightforward setup. It’s a bit complex.

What about the implementation team?

We did not have any setup help just yet. We’ve been doing it all in-house.

What's my experience with pricing, setup cost, and licensing?

I’m not sure of the exact cost of the setup.

What other advice do I have?

I'm not sure which version of the solution we’re using.

We are gold partners.

We test on-premises. However, we plan to use the Microsoft cloud with Bitlocker on it.

I’d advise users to read the documentation. Otherwise, you can get many problems. You also have to be careful with encryption cases.

I’d rate the solution eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Microsoft BitLocker Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2025
Buyer's Guide
Download our free Microsoft BitLocker Report and get advice and tips from experienced pros sharing their opinions.