I don't manage the solution. I don't manage the console and everything. However, password recovery is the best, the easiest part.
The solution is pretty stable.
I don't manage the solution. I don't manage the console and everything. However, password recovery is the best, the easiest part.
The solution is pretty stable.
If it could offer seamless upgrades to seamlessly do the switching that would be great. That's the pain point here now. The setup time takes quite a while sometimes. The encryption, once you install a new computer, takes a few hours to encrypt. From our testing, it feels like nothing is being restored, however, it's actually running in the background.
We'd like to switch from Symantec due to the fact that the switching part is a pain. If we want to switch our Windows it will be a pain to do that. We have thousands of machines. It would be a hassle if you have to switch every time to do that.
The initial setup is a bit complex.
I've worked with the solution for quite some time already. I was using it before I transferred to this current team. I'm not sure for how long it has been at this point. I've used it for some time already.
The stability seems to be okay. It works as it was designed to. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
I can't speak to the scalability. We have about 2,000 people on the solution currently, however, I cannot speak to the scaling process or if we have ever attempted to scale it. We likely won't increase usage.
In terms of technical support, we don't really engage with them. There are not many issues with it. It's just the Windows update that gives us issues. That's the only issue, the main issue. Other than that, there hasn't been a reason to engage with them directly and therefore I can't speak to their level of responsiveness or knowledgeability.
The Symantec setup is a bit complex. It takes time. It is simple, but it takes time. It also takes a bit longer when creating the profiles at first.
It is my understanding that we handled everything in-house. I do not recall using an integrator or consultant.
We pay on a yearly basis. The cost isn't much, however, if we switch to BitLocker there may be some cost savings there as well.
We are currently considering a switch to Bitlocker due to the issues we are facing with updates. It could potentially save us money as well. BitLocker has different types of cost charging depending on which model you choose. We are in the process of evaluation right now.
We are a customer and end-user.
I'm not sure which version of the solution I'm using. It's not the latest one. I understand the latest one will be able to go page Windows - which we also partnered with. The problem is not all our machines are on the latest version. We are looking to see if we switch to the latest one. In a few years, Microsoft will likely change to a new version again. Then we will be having the same problem again.
It's best to align with Microsoft so that we do not have to do so many changes. Not catching up with Windows is also a risk currently due to the Microsoft Edge issue now. Without the latest Windows version, we cannot use the latest Edge version.
I'd rate the solution at a five out of ten overall. It works okay, however, the switching part and initial setup make it an undesirable option for us.
Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails.
We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.
In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another.
There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved.
I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers.
I have been using Symantec Endpoint Encryption for around ten years.
Customers want to go for a solution that is easier to maintain from the infrastructure point of view as well as in terms of support. We don't have a lot of tickets for technical support for our technicians. So, it is a stable product.
We don't have any kind of problem with scalability. It has been really good for us. Our customers are small and medium businesses or SMB companies, and they didn't have any kind of problem. We're talking about 200 or 250 PCs or less. I don't know about its scalability for a large number of users.
When we open a ticket from the web page, it is really hard because they never answer.
When Symantec became Broadcom, we had some problems in getting technical support, especially because no one in Latin America had the possibility to give technical support. We had to call the United States support and receive technical support in English, which is harder for our technicians. Since then, we didn't have any need to create a ticket for technical support. I would rate them an eight out of ten.
We have experience with this solution. Therefore, our technicians can deploy it easily. In the beginning, when implemented it for our initial customers, it was easier. They were PGP at that time. When PGP became Symantec, it was a little hard because of the integration of the products with the Symantec suites. With Broadcom, it has been easy for us. We could work with almost any kind of change that we have received or found with the rebranding of the product.
The deployment duration depends on the number of users that our customers have, but, typically, the server and the configuration of the policies take about one week. After that, we start to deploy it to all the clients, which takes three or four days. We need to wait for the hard disk encryption to be completed, which takes around four or six hours, depending on the information that the users have on the disk. It is usually fast.
I would advise others to be aware of their requirements and about the complexity that they need to adopt. Sometimes people want to have all the information encrypted, but they are not clear about what encryption means. In the case of hard disk encryption, some users don't like to enter an additional password for encryption. They have to enter a password before Windows start, which many users don't like. Therefore, we have to bring some awareness to them and explain the necessity to have another point of control to open their hard disk. So, the main advice would be to be clear about what encryption means.
I would rate Symantec Endpoint Encryption a nine out of ten.
This solution is used predominately for data protection. We want to protect our data in case it is lost, or if we are replacing or upgrading hardware.
The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop.
I do not find the environment to be very user-friendly.
The technical support is not very good, especially for issues involving the encryption.
If the user loses their encryption key then the process for recovering it is complicated and should be made simpler.
During the last upgrade, I experienced some data corruption on my laptop. I was unable to view the data, nor get support from Symantec.
I have been using Symantec Endpoint Encryption for about ten years.
I would rate the stability as good. We use this solution on an occasional basis.
With respect to scalability, we have had some hardware compatibility issues.
We have more than 1,000 users.
My team is in regular contact with technical support, although I have had no direct involvement with them. I do not find them to be very good.
The initial setup is of medium difficulty. It is neither simple nor complex.
The cost of this solution is a little on the higher side.
After implementing Symantec Endpoint Encryption we have been exploring alternate vendors to look at additional features like application protection. One of these solutions is the native Windows 10 BitLocker, and I am also evaluating a product by Dell.
I do not recommend Symantec Endpoint Encryption. The support needs to be improved.
I would rate this solution a six out of ten.
We are using this solution to be compliant with CSP.
After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform.
For the Swift operation, we acquired this solution for the servers and the Endpoints.
We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data.
This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.
The most valuable feature of this solution is encryption.
The reporting is very important for us.
It's a well-known solution and the PGP Solution is a good solution with good performance.
Symantec has SONAR for the antivirus and ransomware behavioral analysis in the endpoints.
We need to develop a process for this solution. We can't deploy the solution without being assisted by or followed by a process. Also, we need to define the process for administrative responsibilities, and the help desk to be notified for every issue with the solution by the users.
If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution.
We would like the editors or solution providers to present us with a roadmap of the new features and their functionalities. If we were to have this roadmap, we could define our roadmap to integrate the new features.
This solution is stable.
This solution is scalable.
It's efficient and we discovered that we can extend the perimeters to cover the entire infrastructure.
We have ten people, but we need three more for the succession plan, and a back up for someone who is not available so that there is continuity when managing the solution.
We haven't had to contact technical support. The solution is very good for us and it responds to our needs.
I used Check Point while I was in Citibank, which was in 2009 and 2010.
The initial setup is not complex, it's easy.
The deployment is easy. You enroll the users and the server, then go to the user and deploy it, reboot the system, then clarify that it is running. From there, you will have an operator to access it.
When the system is rebooted you will be asked for an encryption key. Everyone in the organization has to enter an encryption key.
We have five operators for this platform with four servers.
It is an obligation to deploy it. The scope of compliance, with the goal being to cover all of the infrastructures.
Currently, we outsource the managing of our infrastructure to another company, and we have a dedicated team for our bank. We have the help desk, all of the infrastructure, the networking, the security, and the systems.
We had an integrator to assist us with the implementation and deployment.
Data protect, a Moroccan company that was created in 2009, are also data service providers in all of Africa.
The created subsidiaries in France, Asia, and other countries. They're a good team that is very helpful and efficient.
The price is very good.
They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options.
Checkpoint has better support. With Symantec, we have subsidiaries involved.
The performance is good and it's efficient.
I would rate this solution a nine out of ten.
Symantec Endpoint Encryption is used for data encryption to protect data on the local drive and the hard disk.
I haven't fully utilized the product because I am just in the first testing phase, so I haven't explored it.
In the future, the solution needs network folder encryption that can be done on Macintosh. The solution presently doesn't let network folder encryption be done on Macintosh.
I have been using Symantec Endpoint Encryption for a month. I have used it for testing purposes. I can't say if I am using the solution's latest version since I handle different modules with a top priority for encryption. As a distributor, we sell the product.
Stability-wise, I rate the solution an eight out of ten.
Scalability-wise, I rate the solution an eight out of ten.
I am more familiar with the encryption functionalities provided by Trellix.
The solution’s installation was easy.
The solution's deployment could be done in a couple of minutes.
The solution is deployed on-premises.
The solution requires maintenance, especially on the software update part.
Overall, I rate the solution an eight out of ten.
It is good for encryption and USB devices.
The systems are quite integrated.
The problem with Symantec is that we have solutions that overlap. So sometimes we don't know which solution to use.
We have been using this solution for about five years.
it is quite stable.
Scalability isn't applicable here because it is an endpoint encryption tool. We have about 200 people using the solution. Our usage will increase if we get new employees.
We used McAfee Disk Encryption in the past.
It was hard to install and took us about three months. The installation was outsourced.
It has annual licensing.
I rate this solution a seven out of ten, and I recommend doing a POC before implementing it.
I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot.
We really liked the vanilla flavor set up. It is stable as well.
What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption. With lockdowns and people working from home nowadays because of the COVID-19 pandemic, there's no way to deploy a solution in that manner.
It should be easier to classify documents that should be encrypted, that is, to create policies for documents that should be encrypted. Maybe, it should be according to departments as well.
Customization should be a bit more granular because nowadays, things are very dynamic. Environments are very fluid. So, the policies should reflect that.
In terms of the policies you can apply, there should be a bit more granularity to it, and it should be something that you can turn on and turn off as needed.
I had used Symantec Endpoint Encryption for three months. We used the version before the last version.
It is a stable solution.
For me, the initial setup was intuitive, but then again, I'd had experience with deploying software for 10 years prior to that point.
Back then, deploying software was not like what it is today; it was much harder. You had to do a lot more customization. However, I have a lot experience, so I wouldn't have been phased by any issue I may have encountered.
I'm in Nigeria, and we also serve Ghana, Sierra Leone, Kenya, and a bit of South Africa. Whenever you're deploying security solutions such as Symantec Endpoint Encryption, there has to be a lot more focus on sensitizing the people who are going to be affected.
We train the IT staff on how to manage it, but we don't train the end-users on what it involves and the advantages of the solution. We also don't inform them of the changes they may have to make in terms of their behavior, how they access data, how they use the data, etc. We need to let them know that it doesn't mean that they are completely secure. The biggest issue about security is human error. So, I think sensitizing the users should also go hand in hand with deployment.
I would rate Symantec Endpoint Encryption at eight on a scale from one to ten.
I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.
The most valuable feature is the ease of use.
The stability is good and it is easy to upgrade.
The security could be improved.
I have been working with Symantec Endpoint Encryption for six months.
The stability is good.
This product is very easy to install.
I can install and set up this solution on my own. It is quick to deploy, taking perhaps five minutes.
The license is not very expensive.
This is absolutely a product that I recommend.
I would rate this solution a nine out of ten.