Try our new research platform with insights from 80,000+ expert users
it_user1152534 - PeerSpot reviewer
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
Good performance for encryption that keeps your data secure and confidential
Pros and Cons
  • "We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
  • "If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution."

What is our primary use case?

We are using this solution to be compliant with CSP.

After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform.

For the Swift operation, we acquired this solution for the servers and the Endpoints.

We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data.

This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.

What is most valuable?

The most valuable feature of this solution is encryption.

The reporting is very important for us. 

It's a well-known solution and the PGP Solution is a good solution with good performance.

Symantec has SONAR for the antivirus and ransomware behavioral analysis in the endpoints.

What needs improvement?

We need to develop a process for this solution. We can't deploy the solution without being assisted by or followed by a process. Also, we need to define the process for administrative responsibilities, and the help desk to be notified for every issue with the solution by the users.

If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution.

We would like the editors or solution providers to present us with a roadmap of the new features and their functionalities. If we were to have this roadmap, we could define our roadmap to integrate the new features.

For how long have I used the solution?

I have been using this solution for one year.
Buyer's Guide
Symantec Endpoint Encryption
December 2024
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,158 professionals have used our research since 2012.

What do I think about the stability of the solution?

This solution is stable.

What do I think about the scalability of the solution?

This solution is scalable.

It's efficient and we discovered that we can extend the perimeters to cover the entire infrastructure.

We have ten people, but we need three more for the succession plan, and a back up for someone who is not available so that there is continuity when managing the solution.

How are customer service and support?

We haven't had to contact technical support. The solution is very good for us and it responds to our needs.

Which solution did I use previously and why did I switch?

I used Check Point while I was in Citibank, which was in 2009 and 2010.

How was the initial setup?

The initial setup is not complex, it's easy.

The deployment is easy. You enroll the users and the server, then go to the user and deploy it, reboot the system, then clarify that it is running. From there, you will have an operator to access it.

When the system is rebooted you will be asked for an encryption key. Everyone in the organization has to enter an encryption key.

We have five operators for this platform with four servers.

It is an obligation to deploy it. The scope of compliance, with the goal being to cover all of the infrastructures.

Currently, we outsource the managing of our infrastructure to another company, and we have a dedicated team for our bank. We have the help desk, all of the infrastructure, the networking, the security, and the systems.

What about the implementation team?

We had an integrator to assist us with the implementation and deployment.

Data protect, a Moroccan company that was created in 2009, are also data service providers in all of Africa. 

The created subsidiaries in France, Asia, and other countries. They're a good team that is very helpful and efficient.

What's my experience with pricing, setup cost, and licensing?

The price is very good.

They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options.

What other advice do I have?

Checkpoint has better support. With Symantec, we have subsidiaries involved.

The performance is good and it's efficient.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Jai_Prakash - PeerSpot reviewer
Senior Manager IT at OakNorth Bank
Real User
Top 5
A cloud solution for endpoint protection with easy setup

What is our primary use case?

Endpoint protection is very good, but antivirus needs improvement.

What needs improvement?

When you install Symantec, your system will become slow. They need to work on the console.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for one year. It came along with the laptop.

What do I think about the stability of the solution?

The product’s stability is good.

I rate the solution’s stability a seven out of ten.

What do I think about the scalability of the solution?

We have an Access Plan of the solution.

How was the initial setup?

The initial setup is easy and takes ten minutes to complete.

What other advice do I have?

I recommend the solution. Anyone who wants an antivirus with certain dimensions should go with Symantec if they are not using a new laptop.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Symantec Endpoint Encryption
December 2024
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,158 professionals have used our research since 2012.
IT Manager at a financial services firm with 5,001-10,000 employees
Real User
Top 5Leaderboard
Reliable, easy to expand, and offers good encryption
Pros and Cons
  • "It is fairly stable."
  • "The product can be expensive. Price was a factor in moving away from the product."

What is our primary use case?

We primarily used the solution as part of our company's regulations. It was for our governance.

What is most valuable?

It was fairly easy to encrypt and decrypt files. 

It is fairly stable. 

We could scale the solution. 

What needs improvement?

We'd like the solution to be lighter. Symantec used quite a lot of memory.

The product can be expensive. Price was a factor in moving away from the product.

We'd like it to offer a better decryption tool. If we lost the recovery key, we had a lot of issues. 

For how long have I used the solution?

We've been using the solution for six or seven years. 

What do I think about the stability of the solution?

The solution was stable and did not crash. It didn't have bugs or glitches. 

What do I think about the scalability of the solution?

The scalability has been quite good in general. We could expand if we needed to. 

At the time we were using the solution, we have upwards of 10,000 people on it. 

How are customer service and support?

We never actually contacted technical support. I cannot speak to how helpful or responsive they would be. The only time we might have reached out was when we wanted to do an upgrade. 

Which solution did I use previously and why did I switch?

We've actually already moved over to Bitlocker. We switched in order to take advantage of cost savings. 

How was the initial setup?

The solution had a moderate amount of difficulty at the time of implementation. It was neither easy nor hard. 

What's my experience with pricing, setup cost, and licensing?

We found the solution to be more expensive than Bitlocker, which is what we moved to. 

Which other solutions did I evaluate?

We looked into Bitlocker and began using it last year. We've since moved on from Symantec.

What other advice do I have?

We were a customer and end-user. We replaced the Symantec Encryption.

I'd advise users, whether they use Symantec or not, to study their environment first and really understand what they need. 

I'd rate the solution eight out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Anas Essa - PeerSpot reviewer
Technical Support Engineer- Network Team at PRO TECHnology
MSP
Top 10
Effective with good data protection and helpful support
Pros and Cons
  • "The most effective features of Symantec are those related to data protection."
  • "I would like to see some features or functionality enhanced in Symantec Endpoint Encryption."

What is our primary use case?

We use Symantec Endpoint Encryption for securing corporate data across various devices. It is part of our strategy to deploy encryption solutions effectively.

How has it helped my organization?

Symantec Endpoint Encryption helps us to protect our data and ensure its security across different platforms.

What is most valuable?

The most effective features of Symantec are those related to data protection.

What needs improvement?

I would like to see some features or functionality enhanced in Symantec Endpoint Encryption.

For how long have I used the solution?

I have been working with Symantec Endpoint Encryption for several years.

What do I think about the stability of the solution?

I have not faced any stability or performance issues with Symantec Endpoint Encryption.

What do I think about the scalability of the solution?

I haven't tried to scale it up. I find it scalable for adding additional resources.

How are customer service and support?

I have a positive view of the technical support offered.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We use BitLocker for full disk encryption instead of using Symantec's version.

How was the initial setup?

The setup process was fairly straightforward without major issues.

What about the implementation team?

The deployment process required several people. I do not have an exact number of who was involved.

What was our ROI?

The measurable benefits include effective data protection.

What's my experience with pricing, setup cost, and licensing?

I am not sure about the pricing and licensing cost of Symantec Endpoint Encryption.

Which other solutions did I evaluate?

We compare Symantec with another management solution, BitLocker.

What other advice do I have?

I would recommend Symantec Endpoint Encryption to others who are considering implementing it.

I'd rate the solution eight out of ten

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
reviewer1539126 - PeerSpot reviewer
Forensic Technology Manager at a financial services firm with 5,001-10,000 employees
Real User
Top 5
Seamless encryption with good stability and offers the ability to scale
Pros and Cons
  • "We have been very satisfied with the solution's security capabilities."
  • "From an administration point of view, maybe it would be ideal to have it centrally managed."

What is our primary use case?

The solution is primarily used for encryption. It encrypts drives. It protects drives. The information pertaining to the drive is secured.

What is most valuable?

We have been very satisfied with the solution's security capabilities.

The stability is good.

The product scales very well.

The encryption is pretty seamless.

What needs improvement?

The primary objective is to encrypt drives. It's doing a good job. I cannot recall coming across any missing features. 

From an administration point of view, maybe it would be ideal to have it centrally managed.

For how long have I used the solution?

I used the solution more in my previous role, and probably have about four or five years of experience with the product.

What do I think about the stability of the solution?

The solution has been stable. It does not crash or freeze. It's reliable. There are no bugs or glitches. 

What do I think about the scalability of the solution?

The product can scale if a company needs to expand it. It's not a problem.

We have around 3,500 users on the solution currently.

How are customer service and technical support?

I've never directly dealt with technical support. I can't speak to how helpful or responsive they are.

How was the initial setup?

There wasn't really an implementation process. It's pre-loaded on our Golden Image. It was in with the Windows 10 addition. We didn't have to do anything really.

What's my experience with pricing, setup cost, and licensing?

The product was part of an enterprise solution. Therefore, the pricing was tucked in as part of other Symantec products. It was part of a bundle procurement. There was an antivirus, endpoint encryption, and a whole lot of other Symantec products bundled together.

My understanding is that everything was under a yearly subscription, however, I can't speak to the exact price of the bundle.

What other advice do I have?

Up until last year, I was using the latest version of the solution.

I'd rate the solution at an eight out of ten.

I would recommend the solution to other users and organizations. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Amey Darekar - PeerSpot reviewer
Personal Banker at HDFC Bank
Real User
Top 5Leaderboard
Scalable, easy installation, and simple to use
Pros and Cons
  • "The solution is easy to use."
  • "Symantec Endpoint Encryption can improve by being more secure."

What is our primary use case?

We use Symantec Endpoint Encryption for security.

What is most valuable?

The solution is easy to use.

What needs improvement?

Symantec Endpoint Encryption can improve by being more secure.

For how long have I used the solution?

I have been using this solution for approximately 10 years.

What do I think about the stability of the solution?

Symantec Endpoint Encryption is stable.

What do I think about the scalability of the solution?

The solution is scalable.

We have approximately 20,000 people in my organization using this solution.

How are customer service and technical support?

I have not needed to contact support because we have not had any issues.

How was the initial setup?

The installation is easy.

What about the implementation team?

Our internal IT team of approximately 250 did the implementation of the solution. Additionally, they do the maintenance for the solution.

What's my experience with pricing, setup cost, and licensing?

There is a license required for this solution.

What other advice do I have?

I would recommend this solution.

I rate Symantec Endpoint Encryption a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
TitleGeneral Manager at a tech services company with 501-1,000 employees
Real User
Works transparently in the background, but it is not user-friendly and technical support needs improvement
Pros and Cons
  • "The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop."
  • "I do not find the environment to be very user-friendly."

What is our primary use case?

This solution is used predominately for data protection. We want to protect our data in case it is lost, or if we are replacing or upgrading hardware.

What is most valuable?

The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop.

What needs improvement?

I do not find the environment to be very user-friendly.

The technical support is not very good, especially for issues involving the encryption.

If the user loses their encryption key then the process for recovering it is complicated and should be made simpler.

During the last upgrade, I experienced some data corruption on my laptop. I was unable to view the data, nor get support from Symantec.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for about ten years.

What do I think about the stability of the solution?

I would rate the stability as good. We use this solution on an occasional basis.

What do I think about the scalability of the solution?

With respect to scalability, we have had some hardware compatibility issues.

We have more than 1,000 users.

How are customer service and technical support?

My team is in regular contact with technical support, although I have had no direct involvement with them. I do not find them to be very good.

How was the initial setup?

The initial setup is of medium difficulty. It is neither simple nor complex.

What's my experience with pricing, setup cost, and licensing?

The cost of this solution is a little on the higher side.

Which other solutions did I evaluate?

After implementing Symantec Endpoint Encryption we have been exploring alternate vendors to look at additional features like application protection. One of these solutions is the native Windows 10 BitLocker, and I am also evaluating a product by Dell.

What other advice do I have?

I do not recommend Symantec Endpoint Encryption. The support needs to be improved.

I would rate this solution a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Luka Sibanda - PeerSpot reviewer
Network Technician at ICT Dynamix (Pty) Ltd
MSP
Not user-friendly and lacks integration with ICT, but provides adequate protection
Pros and Cons
  • "The best feature of Symantec Endpoint Encryption is the encryption itself. Encryption truly is the way to go because nowadays we are living in an era of widespread server threats, and you need to encrypt your emails and documents because you never know who might get hold of them."
  • "One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom."

What is our primary use case?

We use Symantec Endpoint Encryption to encrypt either emails or files that a user might want to upload. We typically deploy the encryption on the client's network in order to encrypt their messages or documents before they send them, or after they've been received.

We have just under 20 staff in our company and most of the people working with Symantec Endpoint Encryption are Symantec engineers.

What is most valuable?

The best feature of Symantec Endpoint Encryption is the encryption itself. Encryption truly is the way to go because nowadays we are living in an era of widespread server threats, and you need to encrypt your emails and documents because you never know who might get hold of them.

None of our customers have complained about this solution at all, so I take it that everything is still working fine.

What needs improvement?

One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom.

Another improvement that comes to mind is that it could be made much simpler. The user must be able to use it easily and without any hassle. At present, it's not user-friendly.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for more than five years.

What do I think about the stability of the solution?

So far, we haven't seen any performance or stability issues.

What do I think about the scalability of the solution?

We haven't been through the process of scaling it as such, but we have plenty of experience in deploying it to the cloud. However, sometimes a customer who wanted to deploy it for the cloud won't get back to us, and I think in these cases it has to do with finances rather than more practical matters.

How are customer service and support?

If we have any problems, our best option is to go online and log a ticket, but we haven't yet encountered any issues. 

Which solution did I use previously and why did I switch?

We started with Symantec Endpoint Encryption and haven't used any other solutions of this kind before.

How was the initial setup?

It is complex to set up so you really have to know what you're doing. You must have someone with experience in it before you can deploy it on a customer's premises.

What about the implementation team?

We do the deployment in-house, and it takes a team of about ten people.

What was our ROI?

We don't directly make money when using this tool; instead, we are just using it for protection and security.

What's my experience with pricing, setup cost, and licensing?

Although the performance and stability of this solution are good, our challenge is the price tag. You buy the solution once, but you also have to keep on buying the licenses yearly.

Which other solutions did I evaluate?

In the future, if we decide to evaluate other products we will first compare the new product with Symantec and if it is more user-friendly and cheaper to use, then, naturally, we will go the route of the other product instead.

What other advice do I have?

One piece of advice I would like to share with anyone who'd like to use Symantec is that you need to dig deep into the product and learn it well.

Before you take it into production, you should study it within a simulated environment so that you can really understand how to use it and how you can convince other stakeholders of its value. This includes learning how to deploy it and integrate it with all the other servers that might be found on the customer's environment, especially when it comes to email and file storage, file servers, database servers, and application servers.

I would rate Symantec Endpoint encryption a five out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.