We performed a comparison between Oracle Advanced Security and ZENworks Suite based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option."
"The most valuable feature is the data encryption option for columns and tables."
"Having a single command to encrypt a table would be an improvement."
"It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained."
"If they could introduce it on the cloud, it would be ideal."
"I'm not on the most current version, however, I know one area that I didn't get into that I kind of wanted to is to have a mobile device management tool. My understanding is it's improved a lot from the version I have. It may be a feature that is already available."
Earn 20 points
Oracle Advanced Security is ranked 12th in Endpoint Encryption while ZENworks Suite is ranked 9th in Endpoint Encryption with 2 reviews. Oracle Advanced Security is rated 8.0, while ZENworks Suite is rated 9.6. The top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". On the other hand, the top reviewer of ZENworks Suite writes "Greta for remote control and management with good performance". Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Oracle Data Masking and Subsetting and Protegrity Data Security, whereas ZENworks Suite is most compared with Microsoft BitLocker, Ivanti Device Control and Symantec Endpoint Encryption.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.