IT Central Station is now PeerSpot: Here's why

Micro Focus ZENworks vs Microsoft BitLocker comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Endpoint Encryption
July 2022
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: July 2022.
622,949 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The setup is pretty straightforward."

More Micro Focus ZENworks Pros →

"Feature-wise we have the ability to encrypt fast.""The hard drive encryption is very good.""I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy.""It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked.""The initial setup is very simple.""It's a straightforward solution for encryption.""BitLocker is completely stable.""You can do a silent remote deployment very fast."

More Microsoft BitLocker Pros →

Cons
"I'm not on the most current version, however, I know one area that I didn't get into that I kind of wanted to is to have a mobile device management tool. My understanding is it's improved a lot from the version I have. It may be a feature that is already available."

More Micro Focus ZENworks Cons →

"Some of the technical internal functions, such as encryption protocols or something similar, could be improved.""The pricing should be improved.""Technical support has not been very good.""The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us.""The console GUI could be better.""It's possible that the time it takes to pull items in to BitLocker could be reduced a bit.""The initial setup is complex.""It is not good for cross-compatibility, so our Mac users are not able to use it."

More Microsoft BitLocker Cons →

Pricing and Cost Advice
Information Not Available
  • "BitLocker is included in our license and doesn't cost us anything extra."
  • "It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
  • "I don't know the costs. In terms of Microsoft licensing, we are at E3 on the business, and we're in the process of pricing out and moving to E5. So, a lot of this is included within our licensing agreements."
  • "Microsoft BitLocker is a free feature when you are using Microsoft solutions."
  • "For reasons unknown, Microsoft products seem to be getting more expensive."
  • More Microsoft BitLocker Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    622,949 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The setup is pretty straightforward.
    Top Answer:The model we were in for most of our license covered 200 devices/people and was very cost-effective for the business suite included. Then, once we had to go beyond that for some licensing, it became a… more »
    Top Answer:I'm not on the most current version, however, I know one area that I didn't get into that I kind of wanted to is to have a mobile device management tool. My understanding is it's improved a lot from… more »
    Top Answer:Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinstall… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protection… more »
    Ranking
    7th
    out of 25 in Endpoint Encryption
    Views
    286
    Comparisons
    149
    Reviews
    1
    Average Words per Review
    813
    Rating
    10.0
    1st
    out of 25 in Endpoint Encryption
    Views
    21,433
    Comparisons
    12,116
    Reviews
    11
    Average Words per Review
    599
    Rating
    8.1
    Comparisons
    Also Known As
    ZENworks
    BitLocker, MS BitLocker
    Learn More
    Overview
    ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption) reduces the cost of deploying, managing, and troubleshooting encrypted laptops and desktops. It has automated data protection that locks out threats. It manages encrypted devices remotely and cut travel costs. Avoids security breaches and stay out of the news and gives IT staff a familiar management environment.

    BitLocker is a full disk encryption solution that protects your data from theft, hacking, and loss. BitLocker achieves this by encrypting the entire drive that hosts your operating system and all your data. BitLocker can work on all operating systems, drives, or devices, including portable storage devices.

    After BitLocker completes the data encryption, it generates a recovery key. Only those with the correct encryption key will be able to decrypt and access the encrypted files and information. Attempts to access secured data on premises or over the network will be met with either authentication prompts or error messages saying the data cannot be accessed.

    BitLocker provides its users with peace of mind by improving security and reducing risks of critical data loss and intrusions.

    Benefits of Microsoft BitLocker

    • Comprehensive data protection: BitLocker encryption provides increased security for data throughout its lifecycle, which starts with the creation and storage of the data and ends with its removal. Encryption prevents important data from being accidentally revealed or stolen. When data is encrypted, stealing data is more difficult, and hackers are often discouraged from instigating a cyberattack.

    • BitLocker is free with Microsoft Windows: Microsoft BitLocker is free to use and very easy to set up.

    • Good performance: BitLocker does not make the computer slow down or freeze when in use. You are free to work on other processes with BitLocker running in the background. BitLocker’s interface is very intuitive and the process of encrypting and decrypting data is straightforward and fast.

    • Prevent unauthorized data modification: BitLocker helps to keep your computing environment safe from any unauthorized changes. BitLocker regularly inspects your boot settings every time your PC is turned on. When BitLocker notices that modifications have been made to your boot environment, it forces the PC to enter recovery mode.

    Reviews from Real Users

    Microsoft BitLocker stands out among its competitors for a number of reasons. Two major ones are its powerful encryption capabilities and its user-friendly user interface.

    An ICT operations and security manager notes, “It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked.”

    Kevin C., a director at Pathfinder, writes, “Theease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable.”

    Offer
    Learn more about Micro Focus ZENworks
    Learn more about Microsoft BitLocker
    Sample Customers
    CSC
    ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company27%
    Comms Service Provider16%
    Government13%
    Educational Organization5%
    REVIEWERS
    Financial Services Firm21%
    Insurance Company14%
    Healthcare Company14%
    Renewables & Environment Company14%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider19%
    Government9%
    Financial Services Firm6%
    Company Size
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise31%
    Large Enterprise43%
    REVIEWERS
    Small Business39%
    Midsize Enterprise17%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise18%
    Large Enterprise58%
    Buyer's Guide
    Endpoint Encryption
    July 2022
    Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: July 2022.
    622,949 professionals have used our research since 2012.

    Micro Focus ZENworks is ranked 7th in Endpoint Encryption with 1 review while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 12 reviews. Micro Focus ZENworks is rated 10.0, while Microsoft BitLocker is rated 8.0. The top reviewer of Micro Focus ZENworks writes "Greta for remote control and management with good performance". On the other hand, the top reviewer of Microsoft BitLocker writes "Brings us in compliance, works with our Microsoft tools, and is pretty simple to deploy". Micro Focus ZENworks is most compared with , whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Symantec Endpoint Encryption, Trend Micro Endpoint Encryption and Sophos SafeGuard.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.