Try our new research platform with insights from 80,000+ expert users
CEO at a comms service provider with 10,001+ employees
Reseller
Nov 16, 2020
Stable, secure, and works as per our expectations
Pros and Cons
  • "In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
  • "There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."

What is our primary use case?

Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails.

We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.

What is most valuable?

In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another. 

What needs improvement?

There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved.

I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for around ten years.

Buyer's Guide
Symantec Endpoint Encryption
January 2026
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.

What do I think about the stability of the solution?

Customers want to go for a solution that is easier to maintain from the infrastructure point of view as well as in terms of support. We don't have a lot of tickets for technical support for our technicians. So, it is a stable product.

What do I think about the scalability of the solution?

We don't have any kind of problem with scalability. It has been really good for us. Our customers are small and medium businesses or SMB companies, and they didn't have any kind of problem. We're talking about 200 or 250 PCs or less. I don't know about its scalability for a large number of users.

How are customer service and support?

When we open a ticket from the web page, it is really hard because they never answer. 

When Symantec became Broadcom, we had some problems in getting technical support, especially because no one in Latin America had the possibility to give technical support. We had to call the United States support and receive technical support in English, which is harder for our technicians. Since then, we didn't have any need to create a ticket for technical support. I would rate them an eight out of ten.

How was the initial setup?

We have experience with this solution. Therefore, our technicians can deploy it easily. In the beginning, when implemented it for our initial customers, it was easier. They were PGP at that time. When PGP became Symantec, it was a little hard because of the integration of the products with the Symantec suites. With Broadcom, it has been easy for us. We could work with almost any kind of change that we have received or found with the rebranding of the product.

The deployment duration depends on the number of users that our customers have, but, typically, the server and the configuration of the policies take about one week. After that, we start to deploy it to all the clients, which takes three or four days. We need to wait for the hard disk encryption to be completed, which takes around four or six hours, depending on the information that the users have on the disk. It is usually fast.

What other advice do I have?

I would advise others to be aware of their requirements and about the complexity that they need to adopt. Sometimes people want to have all the information encrypted, but they are not clear about what encryption means. In the case of hard disk encryption, some users don't like to enter an additional password for encryption. They have to enter a password before Windows start, which many users don't like. Therefore, we have to bring some awareness to them and explain the necessity to have another point of control to open their hard disk. So, the main advice would be to be clear about what encryption means.

I would rate Symantec Endpoint Encryption a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
Marlon Advento - PeerSpot reviewer
Technical Consultant at a tech services company with 1,001-5,000 employees
Real User
Jul 18, 2023
A tool that is easy to install and useful for its data encryption functionalities
Pros and Cons
  • "The solution’s installation was easy."
  • "The solution presently doesn't let network folder encryption be done on Macintosh."

What is our primary use case?

Symantec Endpoint Encryption is used for data encryption to protect data on the local drive and the hard disk.

What is most valuable?

I haven't fully utilized the product because I am just in the first testing phase, so I haven't explored it.

What needs improvement?

In the future, the solution needs network folder encryption that can be done on Macintosh. The solution presently doesn't let network folder encryption be done on Macintosh.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for a month. I have used it for testing purposes. I can't say if I am using the solution's latest version since I handle different modules with a top priority for encryption. As a distributor, we sell the product.

What do I think about the stability of the solution?

Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten.

Which solution did I use previously and why did I switch?

I am more familiar with the encryption functionalities provided by Trellix.

How was the initial setup?

The solution’s installation was easy.

The solution's deployment could be done in a couple of minutes.

The solution is deployed on-premises.

What other advice do I have?

The solution requires maintenance, especially on the software update part.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Symantec Endpoint Encryption
January 2026
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.
Rishad Ahmed - PeerSpot reviewer
Network Security Engineer at a non-profit with 1-10 employees
Real User
Top 5
Jan 26, 2023
An easy-to-install solution with a valuable dashboard, endpoint mobile and email encryption
Pros and Cons
  • "We find the dashboard, endpoint mobile encryption, and email encryption valuable."
  • "The solution does not have endpoint control."

What is our primary use case?

Our primary use case for the solution is security encryption for email, mobile and important company documents. We install the solution on cloud and on-premises.

What is most valuable?

We find the dashboard, endpoint mobile encryption, and email encryption valuable.

What needs improvement?

The solution does not have endpoint control. It should be included so clients can easily uninstall their endpoints.

For how long have I used the solution?

We have been using the solution for approximately eight months and are currently using the latest version.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable. I rate it a seven out of ten.

Which solution did I use previously and why did I switch?

We previously used Sophos Intercept but switched to this solution because of its ease of installment, unique features, and antivirus protection from Symantec.

What's my experience with pricing, setup cost, and licensing?

The solution is not expensive.

What other advice do I have?

I rate the solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1717809 - PeerSpot reviewer
Senior Executive Officer (IT) at a financial services firm with 51-200 employees
Real User
Nov 26, 2022
A well-integrated encryption solution, but it was difficult to install
Pros and Cons
  • "It is stable."
  • "It was hard to install and took us about three months."

What is our primary use case?

It is good for encryption and USB devices.

What is most valuable?

The systems are quite integrated.

What needs improvement?

The problem with Symantec is that we have solutions that overlap. So sometimes we don't know which solution to use.

For how long have I used the solution?

We have been using this solution for about five years.

What do I think about the stability of the solution?

it is quite stable. 

What do I think about the scalability of the solution?

Scalability isn't applicable here because it is an endpoint encryption tool. We have about 200 people using the solution. Our usage will increase if we get new employees.

Which solution did I use previously and why did I switch?

We used McAfee Disk Encryption in the past.

How was the initial setup?

It was hard to install and took us about three months. The installation was outsourced.

What's my experience with pricing, setup cost, and licensing?

It has annual licensing.

What other advice do I have?

I rate this solution a seven out of ten, and I recommend doing a POC before implementing it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1575252 - PeerSpot reviewer
Project Manager at a tech services company with 51-200 employees
Real User
Jun 19, 2021
Can be managed from a central point and is stable
Pros and Cons
  • "I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
  • "What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."

What is most valuable?

I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot.

We really liked the vanilla flavor set up. It is stable as well.

What needs improvement?

What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption. With lockdowns and people working from home nowadays because of the COVID-19 pandemic, there's no way to deploy a solution in that manner.

It should be easier to classify documents that should be encrypted, that is, to create policies for documents that should be encrypted. Maybe, it should be according to departments as well.

Customization should be a bit more granular because nowadays, things are very dynamic. Environments are very fluid. So, the policies should reflect that.

In terms of the policies you can apply, there should be a bit more granularity to it, and it should be something that you can turn on and turn off as needed.

For how long have I used the solution?

I had used Symantec Endpoint Encryption for three months. We used the version before the last version.

What do I think about the stability of the solution?

It is a stable solution.

How was the initial setup?

For me, the initial setup was intuitive, but then again, I'd had experience with deploying software for 10 years prior to that point.

Back then, deploying software was not like what it is today; it was much harder. You had to do a lot more customization. However, I have a lot experience, so I wouldn't have been phased by any issue I may have encountered.

What other advice do I have?

I'm in Nigeria, and we also serve Ghana, Sierra Leone, Kenya, and a bit of South Africa. Whenever you're deploying security solutions such as Symantec Endpoint Encryption, there has to be a lot more focus on sensitizing the people who are going to be affected.

We train the IT staff on how to manage it, but we don't train the end-users on what it involves and the advantages of the solution. We also don't inform them of the changes they may have to make in terms of their behavior, how they access data, how they use the data, etc. We need to let them know that it doesn't mean that they are completely secure. The biggest issue about security is human error. So, I think sensitizing the users should also go hand in hand with deployment.

I would rate Symantec Endpoint Encryption at eight on a scale from one to ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
it_user1578519 - PeerSpot reviewer
Specialist: Data Centre Infrastructure at a financial services firm with 1,001-5,000 employees
Real User
May 17, 2021
Easy to set up and use, reasonably-priced, and easy to upgrade
Pros and Cons
  • "The most valuable feature is the ease of use."
  • "The security could be improved."

What is our primary use case?

I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.

What is most valuable?

The most valuable feature is the ease of use.

The stability is good and it is easy to upgrade.

What needs improvement?

The security could be improved.

For how long have I used the solution?

I have been working with Symantec Endpoint Encryption for six months.

What do I think about the stability of the solution?

The stability is good.

How was the initial setup?

This product is very easy to install.

What about the implementation team?

I can install and set up this solution on my own. It is quick to deploy, taking perhaps five minutes.

What's my experience with pricing, setup cost, and licensing?

The license is not very expensive.

What other advice do I have?

This is absolutely a product that I recommend.

I would rate this solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1489089 - PeerSpot reviewer
Manager at a financial services firm with 201-500 employees
Real User
Feb 12, 2021
Scalable, mostly stable, and good management
Pros and Cons
  • "Its management is good, and it is also scalable and mostly stable."
  • "Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine."

What is most valuable?

Its management is good, and it is also scalable and mostly stable.

What needs improvement?

Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine.

For how long have I used the solution?

I have been using this solution for four to five years. I am using its latest version.

What do I think about the stability of the solution?

There are minor challenges related to the updates for Windows and Mac systems, but it is mostly stable.

What do I think about the scalability of the solution?

It is scalable.

How are customer service and technical support?

I didn't contact their technical support.

What other advice do I have?

I would recommend this solution. I would rate Symantec Endpoint Encryption an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Manager at a tech services company with 51-200 employees
Real User
Oct 10, 2020
It doesn't hamper the performance and is well integrated with Symantec Messaging Gateway and Symantec DLP
Pros and Cons
  • "Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
  • "Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."

What is our primary use case?

We use it on laptops and desktops. We use it for email, file and folder, and command-line encryption depending upon the customer's needs. 

We are a service provider for Symantec products. We also use it in our company. We have around 50 to 60 users.

What is most valuable?

Disk encryption and file and folder encryption are the most valuable and used features.

It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action.

What needs improvement?

Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually.

There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release.

For how long have I used the solution?

I have been working with this solution for 14 years.

How are customer service and technical support?

Currently, their support is less and slow. If I open any case, it is handled after two or three days, but their support will improve in the next two or three months.

How was the initial setup?

The initial setup is straightforward. The deployment duration depends on your hard drive. It can take 5 to 10 minutes, half a day, or one day depending on the size of the hard drive. For 80 GB of data, it will take 7 to 8 hours depending on the hard drive and the RPM of the hard drive. For an SSD, it will take less time to encrypt the data.

What other advice do I have?

I would definitely recommend this solution. I have seen a lot of endpoint encryption products, and Symantec is the best because it doesn't hamper the performance of the machine. If you use McAfee, it hampers the performance of the machine.

I would rate Symantec Endpoint Encryption an eight out of ten. Right now, there is an issue going on with their support. That's why I'm not giving it a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.