We use the solution to secure endpoints.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
We use the solution to secure endpoints.
Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage. Microsoft BitLocker's data protection is the most useful for mobile endpoints like laptops.
The management of the product could be made a little easier.
I have been using Microsoft BitLocker for 5-6 years.
I rate the solution ten out of ten for stability.
Around 50 users are using the solution in our organization.
I rate the solution’s scalability ten out of ten.
We didn't pay for additional licenses since the solution is built into Windows.
Before choosing Microsoft BitLocker, we evaluated Trend Micro.
I use the latest version of Microsoft BitLocker. We didn't have any specific incidents where we needed to use the solution's recovery process. However, if there's a problem unlocking devices, it's pretty simple to manage.
The solution is not complicated to manage. Microsoft BitLocker is transparent to end users, and they are unaware of its existence. It doesn't impact their performance in a measurable way, and we don't have any problems with it.
Microsoft BitLocker is a very useful tool for managing endpoints, especially mobile ones, and ensuring that data is not leaked. The solution's drives are integrated into the mobile workstation. We require one person as a backup to maintain the solution, which is not time-consuming. It just takes a few hours every month. I would recommend the solution to other users.
Overall, I rate Microsoft BitLocker ten out of ten.
We use the solution for mobile device protection. Since mobile devices are in transit, it's important to safeguard the data stored on them. Encryption is the solution we can use. We use hardware tools to ensure that the data is only accessible via authorized means. This makes the data usable only for those with the proper authorization.
Trend Micro does not need advanced knowledge about encryption except when they are required to apply assets to the system. You must continue setting up the system with the right profile to avoid any issues.
There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes, we attempt data recovery using the Microsoft version of Encryption, and it's easily manageable. We need to involve the Encryption team.
After installation, some experience crashes. When the system crashes after installation, it is related to the system itself. Essentially, we're facing another issue where an unauthorized person has managed to decrypt the Encryption.
I have been using Trend Micro Endpoint Encryption for a couple of years.
The product is stable.
The solution’s scalability is good.
3.000 users are using this solution.
Customer support is very responsive. We have a very good relationship with them.
The initial setup is straightforward. We did it in-house. We've implemented a solution where we deploy Ethernet connectivity to all our endpoints, mainly focusing on securing mobile devices.
Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.
There are plans to extend it to all endpoints in the future. The reason for prioritizing mobile devices is their prevalent usage, but we acknowledge that desktops are not mobile, so the scope will expand to cover all endpoints.
Due to the industry's demands, we often face considerable downtime, which affects data security and pricing. In terms of removal, we deal with many consigned secrets and confidential data residing on those media. Hence, we must protect those media and implement Trend Micro Endpoint Encryption.
Trend Micro offers very good endpoint security solutions. It's also essential for them to possess strong account security measures. A solid understanding of your experience and how to leverage it effectively is crucial for extracting the most value.
Overall, I rate the solution an eight out of ten.