Try our new research platform with insights from 80,000+ expert users
reviewer1717809 - PeerSpot reviewer
Senior Executive Officer (IT) at a financial services firm with 51-200 employees
Real User
A well-integrated encryption solution, but it was difficult to install
Pros and Cons
  • "It is stable."
  • "It was hard to install and took us about three months."

What is our primary use case?

It is good for encryption and USB devices.

What is most valuable?

The systems are quite integrated.

What needs improvement?

The problem with Symantec is that we have solutions that overlap. So sometimes we don't know which solution to use.

For how long have I used the solution?

We have been using this solution for about five years.

Buyer's Guide
Symantec Endpoint Encryption
October 2024
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.

What do I think about the stability of the solution?

it is quite stable. 

What do I think about the scalability of the solution?

Scalability isn't applicable here because it is an endpoint encryption tool. We have about 200 people using the solution. Our usage will increase if we get new employees.

Which solution did I use previously and why did I switch?

We used McAfee Disk Encryption in the past.

How was the initial setup?

It was hard to install and took us about three months. The installation was outsourced.

What's my experience with pricing, setup cost, and licensing?

It has annual licensing.

What other advice do I have?

I rate this solution a seven out of ten, and I recommend doing a POC before implementing it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Endpoint Specialist at a computer software company with 201-500 employees
Real User
Top 20
A solution that offers good encryption, good stability and an easy setup
Pros and Cons
  • "The encryption feature is very good."
  • "The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product."

What is most valuable?

The encryption feature is very good.

As we're just in the testing phase, we haven't explored many other features in-depth yet.

What needs improvement?

When we started at that time, the engineers configured the solution only for our roaming users. Now, we have to reconfigure to SQL because we have almost 10,000 clients. We have to do this through SQL because we cannot keep a record of each client.

The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product.

Endpoint Encryption should be the same as Endpoint Protection. However, for security purposes, we don't want to show to the client the hard drive encryption and all of those related features. If the solution could remove this visibility on the client level and keep it on the control level of the server, that would be better. We don't want to show to the user the security policies.

For how long have I used the solution?

I've been using the solution for 3 months.

What do I think about the stability of the solution?

We haven't had any issues with the stability of the solution.

What do I think about the scalability of the solution?

The scalability of the solution is fine.

How are customer service and technical support?

We haven't had any issues with the solution yet, so we've never had to contact technical support.

How was the initial setup?

The initial setup is not complex. It's very easy. Deployment time depends on the client and on the machine. Some machines take 24 hours, some machines take three days. Some machines even take up to a half-day. It depends on the hardware.

What about the implementation team?

We had assistance with the integration.

What other advice do I have?

We're using the on-premises deployment model.

I would rate the solution eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Symantec Endpoint Encryption
October 2024
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Manager at a tech services company with 51-200 employees
Real User
It doesn't hamper the performance and is well integrated with Symantec Messaging Gateway and Symantec DLP
Pros and Cons
  • "Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
  • "Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."

What is our primary use case?

We use it on laptops and desktops. We use it for email, file and folder, and command-line encryption depending upon the customer's needs. 

We are a service provider for Symantec products. We also use it in our company. We have around 50 to 60 users.

What is most valuable?

Disk encryption and file and folder encryption are the most valuable and used features.

It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action.

What needs improvement?

Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually.

There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release.

For how long have I used the solution?

I have been working with this solution for 14 years.

How are customer service and technical support?

Currently, their support is less and slow. If I open any case, it is handled after two or three days, but their support will improve in the next two or three months.

How was the initial setup?

The initial setup is straightforward. The deployment duration depends on your hard drive. It can take 5 to 10 minutes, half a day, or one day depending on the size of the hard drive. For 80 GB of data, it will take 7 to 8 hours depending on the hard drive and the RPM of the hard drive. For an SSD, it will take less time to encrypt the data.

What other advice do I have?

I would definitely recommend this solution. I have seen a lot of endpoint encryption products, and Symantec is the best because it doesn't hamper the performance of the machine. If you use McAfee, it hampers the performance of the machine.

I would rate Symantec Endpoint Encryption an eight out of ten. Right now, there is an issue going on with their support. That's why I'm not giving it a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user8682 - PeerSpot reviewer
Consultant at a tech company with 10,001+ employees
Vendor
Master Boot Record (MBR) Corruption and PGP Whole Disk Encryption (WDE)

Today is a big deadline in work. The point when weeks of work move from development to production (via numerous sprints/releases to UAT). The culmination of the development team and my efforts over the last two months. As with most IT projects the last two weeks have been a bit fraught, testing us as we prepare to launch a new suite of Cognos reports.

Today is also the day my Thinkpad has decided to corrupt its master boot record (MBR). Preventing my laptop from loading its operating system. Thankfully Microsoft (and third parties) provide bootable utilities to repair MBRs. However…………

Master Boot Record Corruption / Failure
Master Boot Record Corrupt. FAIL!

My MBR failure is complicated by IBM (sensibly) requiring us to use Symantec’s PGP Whole Disk Encryption (WDE). PGP’s WDE protects our laptops, and any sensitive data on them, in the event laptops are lost or stolen. As a mobile worker, and someone regularly on the move, WDE is a nice saftey blanket. Yes, I know it has venerablities and yes, if someone really wants the data on my laptop they will get it. But for additional security and if the laptop is lost it provides some reassurance. It’s also company policy, there is no point in fighting it.

Update: I was wrong about PGP being crackable. Support are able to sort a forgotten password because we run a support server and since 9.7 there are backups in place to recover a forgotten password. But there is still no known published way to crack PGP WDE. E.g. If you can’t decrypt the hdd, the data is lost. On one hand this makes me feel safer about the loss of a laptop and on the other it makes me glad I have most of my data/files backup up. A reminder that I also need a better backup solution for a hdd failure.

With the entire hard disk drive (hdd) encrypted I can’t use a utility program to fix the MBR. The utilities require you to boot from them and in so doing they skip PGP’s BootGuard. BootGuard lets the OS use the encrypted hdd.  Until the hdd is decrypted the utilties can’t access the MBR, it’s encrypted and the booting hdd doesn’t even appear. Thankfully, I keep my PGP up to date and the right recover CD handy. Recovery Images can be downloaded here:

https://www.symantec.com/business/support/index?page=content&id=TECH149679

Key to know which version of PGP you have. If you can boot into PGP’s BootGuard screen it’s easy to find out: Selecting ‘advance’ instead of ‘continue’ from the options will display the version and other options to assist in recovery. Since a similar failure in 2009 I keep a note of the PGP version I’ve installed (including any service packs). Just incase PGP’s BootGuard also fails to load. It’s not unheard of for both MBR and PGP BootGuard to be corrupted at the same time. Not knowing which version of PGP 9 I’d installed, combined with the bad sectors that caused the HDD to fail, resulted in my old drive being scrap.

Symantec provide a guide for how to recover from this situation here:

https://www.symantec.com/business/support/index?page=content&id=TECH149345

With the matching version of the recovery disk in place I booted off the recovery CD and tried to let Windows boot itself. In rare cases it’s possible that using the Recovery CD instead of the BootGuard installed on the machine will let Windows boot. Sadly this wasn’t the case, I still had an MBR issue. Back to the drawing board, the next step is a longer one: Rebooting off the Recovery CD, entering my password and then pressing ‘D’ to decrypt the entire hdd. We’re now at 90% having started at 9am this morning.

The laptop hdd is 250gig capacity, of which 80gig was in use. I’m hoping the first 80gig takes the longest to decrypt. Ideally the final170gig will be a lot quicker, as it’s empty disk space. I’ll leave it over night and then all being well use MS’s MBR fixer tomorrow. If anything goes wrong or the laptop gets disrupted during the decrypt, all data is lost. Not the most relaxing situation to be in but I have 90% of my data backed up. All my work is stored on IBM’s cloud and I only stand to lose several recently archived locally emails. The main loss will be time in having to rebuild my Thinkpad. As a worst case this isn’t too bad, but fingers crossed I can full decrypt the hdd and recover my current MBR.

Update: Sadly my 80gig and free space decrypting quicker theory has been proved wrong. It’s now at 38% left to go and hopefully will be sorted in the early hours of Tuesday morning (3.5 days to decrypt 250gig). Keeping everything crossed it keeps going and finishes, allowing me to fix the MBR and recover all my data / Laptop. Decryption takes a fraction of the time if the hdd is mounted as a slave on another system. Lesson learnt! From now on I’ll run two hdd and regularly clone (more on this to come in another post).

BootGuard, PGP's Recovery Disk93% – Not going anywhere for a while…………..

Before starting a decrypt via the recovery CD I googled alternative options. If you have a second machine with the same version of PGP installed you can plug the hdd in as a slave (via a USB caddy) and use PGP on the local machine to decrypt the hdd. This is the fastest way, sadly I don’t have another machine with PGP installed.

Update: Plugging the hdd in via a USB caddy / as a slave in a second machine is a lot faster because the Recovery CD is limited to 16 bit processing. If in Windows / Linux or OSX the decryption process can be run at 32bit and takes a fraction of the time. With hind sight waiting for SC to get home and pinching her work laptop would have been a better bet. It’s at 83% now with a very slim chance of being finished by Sunday. At least it’s still going. No physical hdd errors, yet!

I used to backup an image of my machine but Windows 7 made this harder and since upgrading I’ve taken to using IBM’s could to backup all of my work and accepting that if I had a failure I’d need to get an additional machine from IBM and rebuild it. Having now tested this theory it doesn’t work!

The new plan
The Plan comes in two flavours: Get a smart phone and improve laptop & return to weekly disk cloning.

1. Smart Phone: 99% of my work calls are handled by VOIP but I’ve been toying with getting a smart phone for work as a backup access to my work email, calendar, instant messaging and terminal services. Four key components of my day job that I’m currently without due to my laptop decrypting (and being corrupt). As a result I’ve bitten the bullet and ordered the Asus Fonepad. It’s not the best spec but a Galaxy Note II is out of the question at the moment. I hardly make calls on my work phone thanks to VOIP. If I did have to make a call I always have my iPhone5 with free minutes to make an emergency work call while out and about. The concept of a 7inch tablet that doubles as an emergency phone (and can be used with my headset) for £180 delivered was too good to get hung up on the negatives (slower processor and you’d look like a sketch from Trigger Happy TV if you tried to make a call in public on it!). I’ll post more on this when it arrives.

2. SSD and Weekly Cloning: My boss has an SSD drive and the boot times + smoothness of operation have always appealed. I’ve been waiting since I had a reason to rebuild the laptop to get one and this is it. I’ve ordered a Kingston Value 120gig drive after reading this review:

https://www.hardocp.com/article/2013/01/28/kingston_ssdnow_v300_120gb_ssd_review/#.Uc1wrj7F1SU

The time it takes to boot my Thinkpad always frustrates me. Even since upgrading from 4 to 8 gig of RAM it’s still sometimes hangs while paging and under heavy loads. Hoping the SSD will also prove more reliable. My Thinkpads travel a lot, the one before clocked over 100k miles. Combined with being on 5 days a week, most weeks of a year, it’s no wonder hdd fails / issues like this occur. With no moving parts an SSD should prove more reliable. It also means I can keep my current drive as a spare (if it’s not beyond repair) and regularly clone the SSD as a backup. More on this to come after the SSD swap and hopeful recovery. A new backup strategy is required (feel free to suggest any ideas in comments, or to laugh at my expense).

For now the Thinkpad is slowly chugging away decrypting and I’m off out to recover and watch Knee High Perform: https://www.kneehigh.co.uk/show/tristan_yseult.php

Thanks to my teams’ efforts and with lots of phone calls the release has gone to UAT and we’ll go live first thing Monday morning. Wish me luck and for a working Thinkpad asap :) .

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1578519 - PeerSpot reviewer
Specialist: Data Centre Infrastructure at a financial services firm with 1,001-5,000 employees
Real User
Easy to set up and use, reasonably-priced, and easy to upgrade
Pros and Cons
  • "The most valuable feature is the ease of use."
  • "The security could be improved."

What is our primary use case?

I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.

What is most valuable?

The most valuable feature is the ease of use.

The stability is good and it is easy to upgrade.

What needs improvement?

The security could be improved.

For how long have I used the solution?

I have been working with Symantec Endpoint Encryption for six months.

What do I think about the stability of the solution?

The stability is good.

How was the initial setup?

This product is very easy to install.

What about the implementation team?

I can install and set up this solution on my own. It is quick to deploy, taking perhaps five minutes.

What's my experience with pricing, setup cost, and licensing?

The license is not very expensive.

What other advice do I have?

This is absolutely a product that I recommend.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1575252 - PeerSpot reviewer
Project Manager at a tech services company with 51-200 employees
Real User
Can be managed from a central point and is stable
Pros and Cons
  • "I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
  • "What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."

What is most valuable?

I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot.

We really liked the vanilla flavor set up. It is stable as well.

What needs improvement?

What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption. With lockdowns and people working from home nowadays because of the COVID-19 pandemic, there's no way to deploy a solution in that manner.

It should be easier to classify documents that should be encrypted, that is, to create policies for documents that should be encrypted. Maybe, it should be according to departments as well.

Customization should be a bit more granular because nowadays, things are very dynamic. Environments are very fluid. So, the policies should reflect that.

In terms of the policies you can apply, there should be a bit more granularity to it, and it should be something that you can turn on and turn off as needed.

For how long have I used the solution?

I had used Symantec Endpoint Encryption for three months. We used the version before the last version.

What do I think about the stability of the solution?

It is a stable solution.

How was the initial setup?

For me, the initial setup was intuitive, but then again, I'd had experience with deploying software for 10 years prior to that point.

Back then, deploying software was not like what it is today; it was much harder. You had to do a lot more customization. However, I have a lot experience, so I wouldn't have been phased by any issue I may have encountered.

What other advice do I have?

I'm in Nigeria, and we also serve Ghana, Sierra Leone, Kenya, and a bit of South Africa. Whenever you're deploying security solutions such as Symantec Endpoint Encryption, there has to be a lot more focus on sensitizing the people who are going to be affected.

We train the IT staff on how to manage it, but we don't train the end-users on what it involves and the advantages of the solution. We also don't inform them of the changes they may have to make in terms of their behavior, how they access data, how they use the data, etc. We need to let them know that it doesn't mean that they are completely secure. The biggest issue about security is human error. So, I think sensitizing the users should also go hand in hand with deployment.

I would rate Symantec Endpoint Encryption at eight on a scale from one to ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1326714 - PeerSpot reviewer
CTO at a tech vendor with 51-200 employees
Real User
Great protection, perfect for large scale deployments, and low maintenance
Pros and Cons
  • "The solution is great for large-scale deployments."
  • "The solution does slow down the device a little bit, once it's installed."

What is our primary use case?

We primarily use the solution for endpoint security.

What is most valuable?

Symantec Endpoint is good. We have been using it for more than five years and haven't had any trouble with it. It protects us without any issues.

In India, I am based out of Bangalore and my corporate office is in Lucknow, and we never had any compromises on the security site. Our firewall is very strong and all the devices are protected by Symantec. It does a really great job.

The solution is great for large-scale deployments.

The solution is pretty low maintenance and you rarely need the assistance of technical support.

What needs improvement?

The solution does slow down the device a little bit, once it's installed.

The Windows 10 comes with Defender. It has its own security layer. It's supposed to protect desktops and laptops running Windows 10. Right now, our question is, what is the additional protection we get from using any other antivirus or other packages on these machines? Symantec isn't really making it clear how they add to or enhance the level of protection we'd get from them if we kept them with Defender already on Windows 10.

For how long have I used the solution?

We've been using the solution for five years.

What do I think about the stability of the solution?

The stability is good in the sense that we've never been compromised. It just runs in the background and is scanning. However, when scans do happen, it can slow down the machine. That's typical, and it only does it a little bit.

What do I think about the scalability of the solution?

The solution is deployed on a large scale as we operate 1,000 locations in India and it's at all of them. You can't just protect the branch office, you need to protect every device in every office.

How are customer service and technical support?

I've never needed to contact technical support.

The corporate office is in Lucknow, and I'm the technical director of a corporate group. I operate from Bangalore. I don't actually deal with the vendors or with the technical support team. My corporate team in Lucknow may be talking to some technical person at Symantec, however, I'm not aware of that. My responsibility is to advise someone on the technology side, so I heavily depend upon the reports and all that's available in public domain. 

Which other solutions did I evaluate?

I'm not sure what was evaluated beforehand. However, we are evaluating other options currently.

In September, our Symantec license is expiring, so we are looking at if there's anything else in Symantec's product library that we should try or if there are any better options than we should consider. Currently, I'm trying to download some reports to compare Symantec with other solutions as part of some initial research.

We've looked at a few different solutions. We hear that end devices like laptops or desktops are a bit slow when you have Norton installed. AVG looks to have fewer resources although it looks to be a little bit quicker than Norton and doesn't bring your system speed down. Windows 10 also already comes with Defender, so protection would be built right in.

What other advice do I have?

We only use the solution on our own endpoints for our own company and don't necessarily deploy it for clients.

There are a lot of companies in India who are promoting these types of products. They may have quite a good idea about the packages and so on, what you can do, what you can't do and so on. Everyone seems well educated on it. It is not a very complicated solution. It's basically solid. 

You don't need that much technical support. Whether it's Symantec or TrendMicro or AVG or any other package it's all pretty self-sustaining. You'll simply notice it when you have a compromise, at which point you get alerted and then you look at what went wrong. Until you are compromised, you're happy with the product.

I approve of Symantec Endpoint. I've been happy with the solution for the last four or five years. There have been no issues and we have not been compromised until now. I'd definitely recommend Symantec.

I'd rate the solution eight out of ten. It does tend to slow down a machine when it does the scan. However, I've noticed the same slow down on competition like Norton or AVG and it doesn't slow anything down near as much as Norton.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1243704 - PeerSpot reviewer
System Administraor at a tech services company with 11-50 employees
Real User
Has good messaging features but the hard drive encryption needs to be improved
Pros and Cons
  • "The most valuable features are the messaging features and shared folders."
  • "The program's disk encryption is not very friendly with Microsoft OS updates. We have a problem with updates failing unless we use a time-consuming work-around."

What is our primary use case?

We are using three of the product's modules. We are using encryption for messaging, we are using encryption for shared folders and we are using encryption for our hard drives.

How has it helped my organization?

The product has helped our organization by providing encryption options. For example, it is better to have encrypted messages because it is more secure. With the module for the shared folders, we can decide to use it as an addition to our active directory. So we can give users different rights within the active directory. The different set of rules we create in PGP is like an add-on to our active directory and again provides more secure access and restriction of access to some information.

What is most valuable?

The most valuable features are the messaging features and shared folders.

What needs improvement?

The hard drive encryption needs to be improved. There is an issue, for example, where we cannot easily do Microsoft updates. The updates stop before the PGP reboot is complete. So when PGP encryption from the hard drive is active, we can't update Microsoft Windows. As a work-around, we have to decrypt the encrypted hard drive, which takes an hour every time, and then do the updates and then encrypt again. It is time-consuming and there must be a better solution.

One other improvement I would like to see is the ability to get support directly from the seller. There should be a better way to open tickets directly from the seller to eliminate delays and have a better way that we can contact them and get help when we need it. Technical support is a problem.

For how long have I used the solution?

We have been using Symantec Endpoint Encryption since 2013, or about six years.

What do I think about the stability of the solution?

It is not a very stable product based on our experience with how we use it. It is mostly the disk encryption issues and how long it takes to do Microsoft updates. So we actually open some tickets at technical support and also with the integrator who initially installed the system for us. So currently we are dissatisfied and we are looking at BitLocker instead of the PGP only for drive encryption. As it is a Microsoft product, it makes sense that it will work better with Microsoft updates.

What do I think about the scalability of the solution?

The scalability of the product is fine. With PGP servers we can link the Windows account, active directory account with PGP so when I do an installation on a computer, all I have to do is open the profile of the new employee's machine and it is linked to a server. It doesn't matter how many people I link in. We currently have 40 people and the product is installed on all our computers. Most people in our company are consultants who work on the premises of our clients. They are not located within our offices.

How are customer service and technical support?

We have contacted technical support in the past with specific issues but we haven't received any answer yet. So my impression is naturally that the technical support is not great.

Which solution did I use previously and why did I switch?

We are currently looking at Kaspersky Endpoint Encryption for Business Events. I am actually doing testing with a free license that we have access to for 30 days. We are doing this in order to look at the value of the solution, functionalities of the software and if it can apply to our architecture.

Right now we are using Kaspersky but on individual bases. It's not centralized, so each computer has its own Kaspersky security model, but what we want is to be able to manage all the computers in our infrastructure from a central point entry. So that's why we are looking at that specific software. Symantec is not solving all our issues sufficiently.

We are also considering looking into BitLocker to perhaps replace the disk encryption module in Symantec Endpoint Encryption because it is not easy to use.

How was the initial setup?

I wasn't with the company when the product was installed, but I presume the initial setup was complex. The deployment of the product usually takes very little time. I installed the software for new computers and I encrypt the disks. That is all that has to be done so the installation of the product is very quick. It is the encryption of the disk that takes time.

What about the implementation team?

The installation was done by a consultant in 2013.

What's my experience with pricing, setup cost, and licensing?

I am not sure of the licensing fees. I presume there are packages based on what you use. We have three modules (for messaging, disk encryption and shared folders). I believe there are five modules, but we have three out of five. The price scales depending on the number of modules that we use.

What other advice do I have?

My advice to others who are considering this solution is to make sure that they do some testing if they are using disk encryption as we have had problems with updates. Our problem may depend on the version of Windows. So it may be different for other people. I didn't choose to use encryption before, so I learned a lot about the performance and the principle of encryption when it comes to messaging and share folders. So that part is good.

On a scale from one to ten where one is the worst and ten is the best, I would rate Symantec Endpoint Encryption as a six currently. The main problem for us is working with Microsoft updates within PGP. This should be possible because BitLocker is currently doing that which might be a reason we would switch. Updates for Microsoft OS are very complicated for us right now.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2024
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.