"The initial setup is easy."
"This solution can be centrally managed."
"The usability is the most valuable feature."
"The most valuable feature is that everything is done on the server."
"The solution is pretty stable."
"You get updates and other encrypted files easily."
"The most valuable feature is the ease of use."
"Its management is good, and it is also scalable and mostly stable."
"The solution is great for large-scale deployments."
"In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
"The solution is easy to use."
"I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
"Sometimes the server console is very slow, so the performance could be improved."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"I would like to see better compatibility with mobile devices."
"Integration with central management needs improvement."
"More features need to be included in the encryption software."
"There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."
"Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."
"Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine."
"They have too high of a price tag. That's why they're losing the market share."
"The solution does slow down the device a little bit, once it's installed."
"From an administration point of view, maybe it would be ideal to have it centrally managed."
"Symantec Endpoint Encryption can improve by being more secure."
ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 4 reviews while Symantec Endpoint Encryption is ranked 2nd in Endpoint Encryption with 11 reviews. ESET Endpoint Encryption is rated 8.6, while Symantec Endpoint Encryption is rated 7.8. The top reviewer of ESET Endpoint Encryption writes "A stable solution with good support that assists us with GDPR compliance". On the other hand, the top reviewer of Symantec Endpoint Encryption writes "Stable, secure, and works as per our expectations". ESET Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, Cisco Secure Endpoint, Trend Micro Endpoint Encryption and Check Point Full Disk Encryption Software Blade, whereas Symantec Endpoint Encryption is most compared with Microsoft BitLocker, McAfee Complete Data Protection, Trend Micro Endpoint Encryption, Cisco Secure Endpoint and Sophos SafeGuard. See our ESET Endpoint Encryption vs. Symantec Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.