
![Vormetric Data Security Platform [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/otdgs0jxoeglu302ojybk3a0dkuk.jpg?_a=BACAGSGT)
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption.
| Company Size | Count |
|---|---|
| Small Business | 19 |
| Midsize Enterprise | 7 |
| Large Enterprise | 17 |
Symantec Endpoint Encryption provides centralized management and robust encryption, making it a valued security tool for protecting critical data across multiple devices and platforms in industries like finance and government.
Symantec Endpoint Encryption offers seamless integration and scalable security capabilities. Users value its centralized management, strong dashboard, and email protection. Known for ease of use, it supports disk and file encryption, policy assignment, and synchronization of enterprise databases with minimal technical support. Users note challenges in remote deployment and complex manual installations, seeking more intuitive interfaces and better technical support. Performance impact, pricing, and integration with Symantec offerings are areas of concern.
What are the top features of Symantec Endpoint Encryption?Symantec Endpoint Encryption is widely used in finance and government sectors, offering encryption solutions for emails, mobile devices, and critical documents. It addresses endpoint security and compliance, deploying both on-cloud and on-premises to safeguard drives, accounts, and data, crucial for clients with strict compliance policies.
The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. The platform allows you to address data security policies, compliance mandates and best practices by protecting and controlling access to databases, files, and containers for assets residing in cloud, virtual, big data, and physical infrastructures. This scalable, flexible and efficient data security platform prepares your organization for the next security challenge and new compliance requirement at the lowest TCO.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.