Share your experience using Stormshield Data Security

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 84,000+ reviews on PeerSpot:

Senior Network Associate at AMCON, Inc.
Real User
Top 5
Provides a centralized management console and a straightforward initial setup process
Pros and Cons
  • "Antivirus, URL filtering, and firewall protection are the most effective features for data protection."
  • "Upgrades from one version to another may only sometimes be straightforward, especially if one needs a clearer understanding of the process."

What is our primary use case?

The primary use case for Symantec Endpoint Encryption is to provide antivirus protection and application control for users within an organization's environment. Users are restricted from copying files onto removable drives such as flash drives. It enables administrators to block access to all drives, requiring users to request permission to access specific files or drives through Snowflake.

How has it helped my organization?

The benefits of using the platform include protecting our systems from malware and enhancing security against untrusted tools and websites on the internet.

What needs improvement?

We are running the product on-premises but are considering migrating to the cloud. Upgrades from one version to another may only sometimes be straightforward, especially if one needs a clearer understanding of the process.

For how long have I used the solution?

We have been using Symantec Endpoint Encryption for ten years.

What do I think about the stability of the solution?

The platform is stable. The only time we encountered an issue was when one of the servers needed to be restored, but overall, it's been stable with no application crashes.

What do I think about the scalability of the solution?

We have more than 500 Symantec Endpoint Encryption users in our organization. Recently, we increased from 300 to 500 users. For now, we don't have any plans to increase further. However, once the number of endpoints on the network increases, we will need to reconsider.

I rate the scalability a nine out of ten.

How was the initial setup?

The initial setup was straightforward. Once all the right requirements are in place, such as installing the necessary servers, deployment takes less than one hour. The only aspect that may require more time is setting up policies and rules and determining where to apply them, especially if it's a fresh installation.

What about the implementation team?

The implementation was done in-house, using different resources. We have OEM support that we pay for annually, so we usually get support from Broadcom during installation.

What's my experience with pricing, setup cost, and licensing?

We need to acquire a new license. Considering the fluctuation in exchange rates in our part of the world, we find it generally affordable. However, if there's room for it to be made more cost-effective, that would be preferable. Previously, a similar license cost us less than $1000, but now it's nearly $12,000 due to some automatic changes.

What other advice do I have?

In a remote work environment, we utilize the enterprise version of the software. We deploy it at the client end by copying it directly to the system or installing it. Once the systems connect to the console, we can manage them from a central dashboard.

Symantec fits into our data protection strategy by ensuring users cannot physically copy data off the system. Any external drive plugged into our system is recognized as read-only, preventing users from writing to it.

Antivirus, URL filtering, and firewall protection are the most effective features for data protection. Together with antivirus capabilities, these features help ensure protection against various threats.

The centralized management console is crucial. We can deploy, create policies, allow or deny endpoints, implement application control, URL filtering, and more.

When it comes to ease of deployment and scalability, Symantec makes it straightforward. We separate them into one for the service and another for the application. Updates are easy to manage if you use the correct operating system, whether Linux or Windows.

I have recommended it, especially for those who want comprehensive features. It includes application control, malware protection, antivirus, and more, all in a single bundle. Symantec also offers deep encryption capabilities, further enhancing its value proposition.

We don't have issues with malware or viruses on our network because once they release a system fix and then scan, it applies or depends on the virus's status.

I rate it an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Saad Qaiser - PeerSpot reviewer
Manager (Network Design) at Comstar - Information Systems Associates Ltd.
Real User
Top 5
Offers an easy initial setup phase to users
Pros and Cons
  • "It is one of the best products when it comes to stability."
  • "As a tool, Sophos SafeGuard is not optimized."

What is our primary use case?

I use the solution in my company as an encryption solution, meaning that it is useful if you want encryption features. The new name of Sophos SafeGuard is Sophos Central Encryption.

What needs improvement?

As a tool, Sophos SafeGuard is not optimized. I suggest that Sophos SafeGuard should be optimized so that it takes less time to provide encryption features to users. I want Sophos SafeGuard to consider another encryption solution since it currently uses BitLocker. The solution must have alternate encryption methods that users can use to make the tool more effective and a good solution.

From an improvement perspective, I would like to see more integration capabilities being offered by the product. The product is good and works properly in different environments.

For how long have I used the solution?

I have been using Sophos SafeGuard for eight years.

What do I think about the stability of the solution?

It is a stable solution. It is one of the best products when it comes to stability.

What do I think about the scalability of the solution?

It is a scalable solution. It is easy to use the tool's scalability features.

Which solution did I use previously and why did I switch?

I have experience with Trend Micro and Kaspersky. My company likes Sophos SafeGuard over the other products we have used in the past.

How was the initial setup?

The product's initial setup phase is easy and not very difficult. Sophos SafeGuard is a cloud-based product. Users have to consider their assets to be encrypted. Sophos SafeGuard is not a very complex solution, meaning it is an easy tool to handle.

You must buy a Sophos Central Encryption license if you have a Sophos Central account. Once you get the license, you have to install the agent on your devices to encrypt the data. The deployment process is not complex and consists of simple steps.

What other advice do I have?

In case of device loss or theft, you know that all your data is encrypted, and no one can use the data if you are using Sophos SafeGuard in your company, ensuring that the device encryption feature is useful.

In Sophos SafeGuard, the management of encryption keys is easy.

The product's seamless integration capabilities with existing systems have improved the company's data security posture. The product is well integrated with different environments like Windows, Mac, and other solutions. The tool has good integration features and works fine with Windows, Mac, and other products.

I recommend the product to those who plan to use it. I suggest others go for Sophos Endpoint Protection and Sophos Firewall, as both products work fine if configured properly.

The product's compliance with data protection regulations makes it easy for our company to use. The compliance with data protection regulations makes it a good solution to be deployed for some of our company's clients who follow NIST or CIS benchmarks.

The product is beneficial for those who suffer from data losses in their company. I recommend the product to others since it is really helpful to protect data.

I rate the overall tool an eight and a half out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate