I use it for authentication of administrators and the users of applications.
It's primarily for application access authentication.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
I use it for authentication of administrators and the users of applications.
It's primarily for application access authentication.
First, it's very secure.
Second, it's reliable.
Additionally, it contains audit trails, which are essential in case of a security breach for investigation purposes.
Integration with other solutions is one of its strongest points. It's very easy to integrate and automate.
Encryption is not the major focus of this technology. It's embedded, so the specific encryption method used isn't the primary concern for us.
There's no centralized management. This is a drawback.
Along with centralized management, it's also complex to deploy.
Ideally, we need centralized management for all clients and a simplified deployment process.
So, those are the two major points we'd like to see improved.
I have been using it for three year.
It's very stable once deployed. I would rate the stability a nine out of ten.
We haven't tested its limits yet as our customer base is smaller. However, Sophos claims it's very scalable and can handle thousands of users.
Currently, four customers use the technology.
The tech support is good. But we haven't needed to contact them too many times.
Positive
It is complex to deploy. It took roughly six to nine months, which is a problem.
Sophos can make it faster and easier to deploy.
The steps to deploy are: first, understanding requirements; second, setting up the infrastructure; third, loading the data; and finally, testing.
A team of five to seven is ideal. Currently, we have five people with different skill sets handling it.
The deployment model is flexible. It can be deployed either cloud-based or on-premises.
There are two key values. First, it significantly enhances security, which is crucial for modern applications. Second, it has a great return on investment because once deployed, it requires minimal ongoing maintenance and becomes a steady revenue generation tool.
It's a software license with a one-time purchase. There are no issues with purchasing, and the vendor is flexible with licensing.
We evaluated many other options and found SafeGuard stood out due to its variety of features that matched our requirements. Other technologies might be better for different companies depending on their specific needs.
Sophos aligned best with our requirements. Other solutions might be better suited for different companies if they have different needs.
Overall, I would rate the solution an eight out of ten.
Consider the deployment time in advance. It takes a while to deploy, so if you need it next year, start the deployment this year.
We use the solution to secure endpoints.
Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage. Microsoft BitLocker's data protection is the most useful for mobile endpoints like laptops.
The management of the product could be made a little easier.
I have been using Microsoft BitLocker for 5-6 years.
I rate the solution ten out of ten for stability.
Around 50 users are using the solution in our organization.
I rate the solution’s scalability ten out of ten.
We didn't pay for additional licenses since the solution is built into Windows.
Before choosing Microsoft BitLocker, we evaluated Trend Micro.
I use the latest version of Microsoft BitLocker. We didn't have any specific incidents where we needed to use the solution's recovery process. However, if there's a problem unlocking devices, it's pretty simple to manage.
The solution is not complicated to manage. Microsoft BitLocker is transparent to end users, and they are unaware of its existence. It doesn't impact their performance in a measurable way, and we don't have any problems with it.
Microsoft BitLocker is a very useful tool for managing endpoints, especially mobile ones, and ensuring that data is not leaked. The solution's drives are integrated into the mobile workstation. We require one person as a backup to maintain the solution, which is not time-consuming. It just takes a few hours every month. I would recommend the solution to other users.
Overall, I rate Microsoft BitLocker ten out of ten.