The primary use case for Symantec Endpoint Encryption is to provide antivirus protection and application control for users within an organization's environment. Users are restricted from copying files onto removable drives such as flash drives. It enables administrators to block access to all drives, requiring users to request permission to access specific files or drives through Snowflake.
Our primary use case for the solution is security encryption for email, mobile and important company documents. We install the solution on cloud and on-premises.
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails. We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.
Manager at a tech services company with 51-200 employees
Real User
2020-10-04T06:40:15Z
Oct 4, 2020
We use it on laptops and desktops. We use it for email, file and folder, and command-line encryption depending upon the customer's needs. We are a service provider for Symantec products. We also use it in our company. We have around 50 to 60 users.
Assistant System Engineer at a tech services company with 51-200 employees
Real User
2020-07-06T08:10:00Z
Jul 6, 2020
We are currently working with companies in the financial sector which is why we are using this on-premises solution, because their compliance policies do not allow for cloud-based servers. Our clients are using the full encryptions. They're using Symantec Endpoint Encryption to secure their data. If someone loses their laptop, for example, they can wipe their disk and save their data from ending up with a third party.
Our primary use is implementing the solution for our clients. We are an official partner for Symantec and implement it for clients but we are also using that same solution. Most of the clients are on-premises installations although we do have some clients using cloud and hybrid-cloud deployments. So between our clients and their usage, we have experience with representatives who are using all the server deployment types. But the vast majority still stay with the on-premises deployment. This is especially true for banking customers who have stricter requirements for regulatory compliance.
System Administraor at a tech services company with 11-50 employees
Real User
2019-12-12T07:48:00Z
Dec 12, 2019
We are using three of the product's modules. We are using encryption for messaging, we are using encryption for shared folders and we are using encryption for our hard drives.
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
2019-11-18T07:22:00Z
Nov 18, 2019
We are using this solution to be compliant with CSP. After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform. For the Swift operation, we acquired this solution for the servers and the Endpoints. We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data. This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.
Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.
The primary use case for Symantec Endpoint Encryption is to provide antivirus protection and application control for users within an organization's environment. Users are restricted from copying files onto removable drives such as flash drives. It enables administrators to block access to all drives, requiring users to request permission to access specific files or drives through Snowflake.
We use it as the antivirus solution for our client machines.
Endpoint protection is very good, but antivirus needs improvement.
One of my customers asked me about a feature where they could encrypt files automatically. Symantec Encryption was a good choice.
Symantec Endpoint Encryption is used for data encryption to protect data on the local drive and the hard disk.
Our primary use case for the solution is security encryption for email, mobile and important company documents. We install the solution on cloud and on-premises.
My use case is to protect my assets and information, and to have visibility over user activity.
We primarily used the solution as part of our company's regulations. It was for our governance.
We use the solution for endpoint protection. It can help us protect our information.
The solution is primarily used for encryption. It encrypts drives. It protects drives. The information pertaining to the drive is secured.
I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.
Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails. We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.
We use it on laptops and desktops. We use it for email, file and folder, and command-line encryption depending upon the customer's needs. We are a service provider for Symantec products. We also use it in our company. We have around 50 to 60 users.
We primarily use the solution for endpoint security.
We are currently working with companies in the financial sector which is why we are using this on-premises solution, because their compliance policies do not allow for cloud-based servers. Our clients are using the full encryptions. They're using Symantec Endpoint Encryption to secure their data. If someone loses their laptop, for example, they can wipe their disk and save their data from ending up with a third party.
This solution is used predominately for data protection. We want to protect our data in case it is lost, or if we are replacing or upgrading hardware.
Our primary use is implementing the solution for our clients. We are an official partner for Symantec and implement it for clients but we are also using that same solution. Most of the clients are on-premises installations although we do have some clients using cloud and hybrid-cloud deployments. So between our clients and their usage, we have experience with representatives who are using all the server deployment types. But the vast majority still stay with the on-premises deployment. This is especially true for banking customers who have stricter requirements for regulatory compliance.
We are using three of the product's modules. We are using encryption for messaging, we are using encryption for shared folders and we are using encryption for our hard drives.
We are using this solution to be compliant with CSP. After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform. For the Swift operation, we acquired this solution for the servers and the Endpoints. We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data. This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.
The primary use case of this solution is for endpoint Security for the Government of the Ministries that we are employed in.
The primary use case is just endpoint protection. It is the basis of our whole infrastructure for security staff.
The primary use case is to protect from data loss prevention in my company.
We use it to patch information systems.
The primary use case is for protecting accounts.