Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails.
We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.
In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another.