The quality of protection is very important. The tool must also not slow down the computer. The quality of the user interface and the way the solution is updated must also be considered. The updates depend on certain situations. People who want to use the solution must check how it is working, check the memory, and the processes that are run. We must check if there are any unwanted features. For example, some antivirus tools install other services that are not necessary, and they are frequently updated. It won’t be a problem for a user who has a computer with more RAM, but it will be difficult to use it on an old computer with less RAM. The IT department uses remote features. Sometimes, they change some configurations remotely. Overall, I rate the tool a nine out of ten.
Senior Information System Officer at a construction company with 51-200 employees
Real User
2022-08-26T16:50:05Z
Aug 26, 2022
We are just end users and customers. While we are on-premises right now, we are actually thinking of upgrading to the cloud so that it's easier to manage. I'd rate the solution an eight out of ten.
System Organizer at a translation and localization position with 1-10 employees
Real User
Top 5
2020-02-18T07:41:14Z
Feb 18, 2020
My advice to anybody who is implementing this solution is to have a good knowledge of what it is that you want to do. If all of the policies have been decided with respect to what you want to allow, and what you do not want to allow, then it will be easy to deploy this solution on all of the clients. With any product, there is always something that can be improved. I would rate this solution an eight out of ten.
Team Leader at a university with 201-500 employees
Real User
2019-03-11T07:21:00Z
Mar 11, 2019
The product is versatile, and the company continues to bring out more products. Before we installed the central management console, we were not able to pull any reports of how many threats were being blocked in our environment. So, we couldn't bargain a security budget with management without those reports and data of what is being blocked, showing how much we saved. Therefore, it improved our capabilities of asking for a security budget, as we collected the data that was coming in from all the client devices. Context is louder than volume. You need the data in order to win your board.
Endpoint Encryption protects sensitive data by encrypting it on devices such as laptops, tablets, and smartphones. It ensures data security even if the device is lost or stolen.
Organizations use Endpoint Encryption to safeguard proprietary information and comply with regulatory requirements. This solution encrypts data at the file or disk level, making it unreadable without proper authorization. It is essential for securing confidential information and preventing unauthorized access....
I rate the tool a nine out of ten.
The quality of protection is very important. The tool must also not slow down the computer. The quality of the user interface and the way the solution is updated must also be considered. The updates depend on certain situations. People who want to use the solution must check how it is working, check the memory, and the processes that are run. We must check if there are any unwanted features. For example, some antivirus tools install other services that are not necessary, and they are frequently updated. It won’t be a problem for a user who has a computer with more RAM, but it will be difficult to use it on an old computer with less RAM. The IT department uses remote features. Sometimes, they change some configurations remotely. Overall, I rate the tool a nine out of ten.
I rate ESET Endpoint Encryption an eight out of ten.
Overall, I rate ESET Endpoint Encryption an eight out of ten.
ESET Endpoint Encryption is easy to use. I rate it a ten out of ten.
I would rate it an eight out of ten.
ESET has a good solution, and I would advise others to prepare their systems for installation. I rate ESET Endpoint Encryption nine out of ten.
We are just end users and customers. While we are on-premises right now, we are actually thinking of upgrading to the cloud so that it's easier to manage. I'd rate the solution an eight out of ten.
I rate ESET Endpoint Encryption as an eight out of ten.
ESET is a product that I recommend people switch to for encrypting their documents. I would rate this solution an eight out of ten.
My advice to anybody who is implementing this solution is to have a good knowledge of what it is that you want to do. If all of the policies have been decided with respect to what you want to allow, and what you do not want to allow, then it will be easy to deploy this solution on all of the clients. With any product, there is always something that can be improved. I would rate this solution an eight out of ten.
I would recommend this solution. I would rate this solution a ten out of ten.
The product is versatile, and the company continues to bring out more products. Before we installed the central management console, we were not able to pull any reports of how many threats were being blocked in our environment. So, we couldn't bargain a security budget with management without those reports and data of what is being blocked, showing how much we saved. Therefore, it improved our capabilities of asking for a security budget, as we collected the data that was coming in from all the client devices. Context is louder than volume. You need the data in order to win your board.