Share your experience using Vormetric Data Security Platform [EOL]

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Head of IT at a financial services firm with 11-50 employees
Real User
Top 5Leaderboard
Easy to manage and provides good endpoint encryption
Pros and Cons
  • "Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
  • "The management of the product could be made a little easier."

What is our primary use case?

We use the solution to secure endpoints.

What is most valuable?

Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage. Microsoft BitLocker's data protection is the most useful for mobile endpoints like laptops.

What needs improvement?

The management of the product could be made a little easier.

For how long have I used the solution?

I have been using Microsoft BitLocker for 5-6 years.

What do I think about the stability of the solution?

I rate the solution ten out of ten for stability.

What do I think about the scalability of the solution?

Around 50 users are using the solution in our organization.

I rate the solution’s scalability ten out of ten.

What's my experience with pricing, setup cost, and licensing?

We didn't pay for additional licenses since the solution is built into Windows.

Which other solutions did I evaluate?

Before choosing Microsoft BitLocker, we evaluated Trend Micro.

What other advice do I have?

I use the latest version of Microsoft BitLocker. We didn't have any specific incidents where we needed to use the solution's recovery process. However, if there's a problem unlocking devices, it's pretty simple to manage.

The solution is not complicated to manage. Microsoft BitLocker is transparent to end users, and they are unaware of its existence. It doesn't impact their performance in a measurable way, and we don't have any problems with it.

Microsoft BitLocker is a very useful tool for managing endpoints, especially mobile ones, and ensuring that data is not leaked. The solution's drives are integrated into the mobile workstation. We require one person as a backup to maintain the solution, which is not time-consuming. It just takes a few hours every month. I would recommend the solution to other users.

Overall, I rate Microsoft BitLocker ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Information Security Management Individual Contributor at First Bank of Nigeria Ltd.
Real User
Top 5Leaderboard
Used for mobile device protection with moderate pricing
Pros and Cons
  • "Offers very good endpoint security solutions."
  • "There are recovery issues that arise."

What is our primary use case?

We use the solution for mobile device protection. Since mobile devices are in transit, it's important to safeguard the data stored on them. Encryption is the solution we can use. We use hardware tools to ensure that the data is only accessible via authorized means. This makes the data usable only for those with the proper authorization.

What is most valuable?

Trend Micro does not need advanced knowledge about encryption except when they are required to apply assets to the system. You must continue setting up the system with the right profile to avoid any issues.

What needs improvement?

There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes, we attempt data recovery using the Microsoft version of Encryption, and it's easily manageable. We need to involve the Encryption team.

After installation, some experience crashes. When the system crashes after installation, it is related to the system itself. Essentially, we're facing another issue where an unauthorized person has managed to decrypt the Encryption.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for a couple of years.

What do I think about the stability of the solution?

The product is stable.

What do I think about the scalability of the solution?

The solution’s scalability is good.

3.000 users are using this solution.

How are customer service and support?

Customer support is very responsive. We have a very good relationship with them.

How was the initial setup?

The initial setup is straightforward.  We did it in-house. We've implemented a solution where we deploy Ethernet connectivity to all our endpoints, mainly focusing on securing mobile devices.

What's my experience with pricing, setup cost, and licensing?

Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.

What other advice do I have?

There are plans to extend it to all endpoints in the future. The reason for prioritizing mobile devices is their prevalent usage, but we acknowledge that desktops are not mobile, so the scope will expand to cover all endpoints.

Due to the industry's demands, we often face considerable downtime, which affects data security and pricing. In terms of removal, we deal with many consigned secrets and confidential data residing on those media. Hence, we must protect those media and implement Trend Micro Endpoint Encryption.

Trend Micro offers very good endpoint security solutions. It's also essential for them to possess strong account security measures. A solid understanding of your experience and how to leverage it effectively is crucial for extracting the most value.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate