"The setup is pretty straightforward."
"Feature-wise we have the ability to encrypt fast."
"The hard drive encryption is very good."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked."
"The initial setup is very simple."
"It's a straightforward solution for encryption."
"BitLocker is completely stable."
"You can do a silent remote deployment very fast."
"I'm not on the most current version, however, I know one area that I didn't get into that I kind of wanted to is to have a mobile device management tool. My understanding is it's improved a lot from the version I have. It may be a feature that is already available."
"Some of the technical internal functions, such as encryption protocols or something similar, could be improved."
"The pricing should be improved."
"Technical support has not been very good."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"The console GUI could be better."
"It's possible that the time it takes to pull items in to BitLocker could be reduced a bit."
"The initial setup is complex."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
BitLocker is a full disk encryption solution that protects your data from theft, hacking, and loss. BitLocker achieves this by encrypting the entire drive that hosts your operating system and all your data. BitLocker can work on all operating systems, drives, or devices, including portable storage devices.
After BitLocker completes the data encryption, it generates a recovery key. Only those with the correct encryption key will be able to decrypt and access the encrypted files and information. Attempts to access secured data on premises or over the network will be met with either authentication prompts or error messages saying the data cannot be accessed.
BitLocker provides its users with peace of mind by improving security and reducing risks of critical data loss and intrusions.
Benefits of Microsoft BitLocker
Reviews from Real Users
Microsoft BitLocker stands out among its competitors for a number of reasons. Two major ones are its powerful encryption capabilities and its user-friendly user interface.
An ICT operations and security manager notes, “It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked.”
Kevin C., a director at Pathfinder, writes, “Theease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable.”
Micro Focus ZENworks is ranked 7th in Endpoint Encryption with 1 review while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 12 reviews. Micro Focus ZENworks is rated 10.0, while Microsoft BitLocker is rated 8.0. The top reviewer of Micro Focus ZENworks writes "Greta for remote control and management with good performance". On the other hand, the top reviewer of Microsoft BitLocker writes "Brings us in compliance, works with our Microsoft tools, and is pretty simple to deploy". Micro Focus ZENworks is most compared with , whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Symantec Endpoint Encryption, Trend Micro Endpoint Encryption and Sophos SafeGuard.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.