Share your experience using Vormetric Data Security Platform [EOL]

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Senior Manager Network Design at MEEZA, Managed IT Services Provider
Real User
Top 5Leaderboard
Contains audit trails, which are essential in case of a security breach for investigation purposes
Pros and Cons
  • "Integration with other solutions is one of its strongest points. It's very easy to integrate and automate."
  • "There's no centralized management. This is a drawback."

What is our primary use case?

I use it for authentication of administrators and the users of applications.

It's primarily for application access authentication.

What is most valuable?

First, it's very secure. 

Second, it's reliable. 

Additionally, it contains audit trails, which are essential in case of a security breach for investigation purposes.

Integration with other solutions is one of its strongest points. It's very easy to integrate and automate.

Encryption is not the major focus of this technology. It's embedded, so the specific encryption method used isn't the primary concern for us.

What needs improvement?

There's no centralized management. This is a drawback.

Along with centralized management, it's also complex to deploy.

Ideally, we need centralized management for all clients and a simplified deployment process.

So, those are the two major points we'd like to see improved.

For how long have I used the solution?

I have been using it for three year.

What do I think about the stability of the solution?

It's very stable once deployed. I would rate the stability a nine out of ten. 

What do I think about the scalability of the solution?

We haven't tested its limits yet as our customer base is smaller. However, Sophos claims it's very scalable and can handle thousands of users.

Currently, four customers use the technology.

How are customer service and support?

The tech support is good. But we haven't needed to contact them too many times. 

How would you rate customer service and support?

Positive

How was the initial setup?

It is complex to deploy. It took roughly six to nine months, which is a problem.

Sophos can make it faster and easier to deploy. 

What about the implementation team?

The steps to deploy are: first, understanding requirements; second, setting up the infrastructure; third, loading the data; and finally, testing.

A team of five to seven is ideal. Currently, we have five people with different skill sets handling it.

The deployment model is flexible. It can be deployed either cloud-based or on-premises.

What was our ROI?

There are two key values. First, it significantly enhances security, which is crucial for modern applications. Second, it has a great return on investment because once deployed, it requires minimal ongoing maintenance and becomes a steady revenue generation tool.

What's my experience with pricing, setup cost, and licensing?

It's a software license with a one-time purchase. There are no issues with purchasing, and the vendor is flexible with licensing.

Which other solutions did I evaluate?

We evaluated many other options and found SafeGuard stood out due to its variety of features that matched our requirements. Other technologies might be better for different companies depending on their specific needs.

Sophos aligned best with our requirements. Other solutions might be better suited for different companies if they have different needs.

What other advice do I have?

Overall, I would rate the solution an eight out of ten.

Consider the deployment time in advance. It takes a while to deploy, so if you need it next year, start the deployment this year.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
Head of IT at a financial services firm with 11-50 employees
Real User
Top 5Leaderboard
Easy to manage and provides good endpoint encryption
Pros and Cons
  • "Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
  • "The management of the product could be made a little easier."

What is our primary use case?

We use the solution to secure endpoints.

What is most valuable?

Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage. Microsoft BitLocker's data protection is the most useful for mobile endpoints like laptops.

What needs improvement?

The management of the product could be made a little easier.

For how long have I used the solution?

I have been using Microsoft BitLocker for 5-6 years.

What do I think about the stability of the solution?

I rate the solution ten out of ten for stability.

What do I think about the scalability of the solution?

Around 50 users are using the solution in our organization.

I rate the solution’s scalability ten out of ten.

What's my experience with pricing, setup cost, and licensing?

We didn't pay for additional licenses since the solution is built into Windows.

Which other solutions did I evaluate?

Before choosing Microsoft BitLocker, we evaluated Trend Micro.

What other advice do I have?

I use the latest version of Microsoft BitLocker. We didn't have any specific incidents where we needed to use the solution's recovery process. However, if there's a problem unlocking devices, it's pretty simple to manage.

The solution is not complicated to manage. Microsoft BitLocker is transparent to end users, and they are unaware of its existence. It doesn't impact their performance in a measurable way, and we don't have any problems with it.

Microsoft BitLocker is a very useful tool for managing endpoints, especially mobile ones, and ensuring that data is not leaked. The solution's drives are integrated into the mobile workstation. We require one person as a backup to maintain the solution, which is not time-consuming. It just takes a few hours every month. I would recommend the solution to other users.

Overall, I rate Microsoft BitLocker ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate