Try our new research platform with insights from 80,000+ expert users
CEO at CT AMERICA
Reseller
Stable, secure, and works as per our expectations
Pros and Cons
  • "In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
  • "There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."

What is our primary use case?

Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails.

We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.

What is most valuable?

In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another. 

What needs improvement?

There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved.

I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for around ten years.

Buyer's Guide
Symantec Endpoint Encryption
May 2025
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.

What do I think about the stability of the solution?

Customers want to go for a solution that is easier to maintain from the infrastructure point of view as well as in terms of support. We don't have a lot of tickets for technical support for our technicians. So, it is a stable product.

What do I think about the scalability of the solution?

We don't have any kind of problem with scalability. It has been really good for us. Our customers are small and medium businesses or SMB companies, and they didn't have any kind of problem. We're talking about 200 or 250 PCs or less. I don't know about its scalability for a large number of users.

How are customer service and support?

When we open a ticket from the web page, it is really hard because they never answer. 

When Symantec became Broadcom, we had some problems in getting technical support, especially because no one in Latin America had the possibility to give technical support. We had to call the United States support and receive technical support in English, which is harder for our technicians. Since then, we didn't have any need to create a ticket for technical support. I would rate them an eight out of ten.

How was the initial setup?

We have experience with this solution. Therefore, our technicians can deploy it easily. In the beginning, when implemented it for our initial customers, it was easier. They were PGP at that time. When PGP became Symantec, it was a little hard because of the integration of the products with the Symantec suites. With Broadcom, it has been easy for us. We could work with almost any kind of change that we have received or found with the rebranding of the product.

The deployment duration depends on the number of users that our customers have, but, typically, the server and the configuration of the policies take about one week. After that, we start to deploy it to all the clients, which takes three or four days. We need to wait for the hard disk encryption to be completed, which takes around four or six hours, depending on the information that the users have on the disk. It is usually fast.

What other advice do I have?

I would advise others to be aware of their requirements and about the complexity that they need to adopt. Sometimes people want to have all the information encrypted, but they are not clear about what encryption means. In the case of hard disk encryption, some users don't like to enter an additional password for encryption. They have to enter a password before Windows start, which many users don't like. Therefore, we have to bring some awareness to them and explain the necessity to have another point of control to open their hard disk. So, the main advice would be to be clear about what encryption means.

I would rate Symantec Endpoint Encryption a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
TitleGeneral Manager at a tech services company with 501-1,000 employees
Real User
Works transparently in the background, but it is not user-friendly and technical support needs improvement
Pros and Cons
  • "The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop."
  • "I do not find the environment to be very user-friendly."

What is our primary use case?

This solution is used predominately for data protection. We want to protect our data in case it is lost, or if we are replacing or upgrading hardware.

What is most valuable?

The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop.

What needs improvement?

I do not find the environment to be very user-friendly.

The technical support is not very good, especially for issues involving the encryption.

If the user loses their encryption key then the process for recovering it is complicated and should be made simpler.

During the last upgrade, I experienced some data corruption on my laptop. I was unable to view the data, nor get support from Symantec.

For how long have I used the solution?

I have been using Symantec Endpoint Encryption for about ten years.

What do I think about the stability of the solution?

I would rate the stability as good. We use this solution on an occasional basis.

What do I think about the scalability of the solution?

With respect to scalability, we have had some hardware compatibility issues.

We have more than 1,000 users.

How are customer service and technical support?

My team is in regular contact with technical support, although I have had no direct involvement with them. I do not find them to be very good.

How was the initial setup?

The initial setup is of medium difficulty. It is neither simple nor complex.

What's my experience with pricing, setup cost, and licensing?

The cost of this solution is a little on the higher side.

Which other solutions did I evaluate?

After implementing Symantec Endpoint Encryption we have been exploring alternate vendors to look at additional features like application protection. One of these solutions is the native Windows 10 BitLocker, and I am also evaluating a product by Dell.

What other advice do I have?

I do not recommend Symantec Endpoint Encryption. The support needs to be improved.

I would rate this solution a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Symantec Endpoint Encryption
May 2025
Learn what your peers think about Symantec Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
Project Manager at Target IS
Real User
Versatile, all-in-one, centralized enterprise solution that understands and has a good sense of enterprise requirements
Pros and Cons
  • "This product is a solid, all-in-one solution for enterprise data management."
  • "The instability of the company and lack of presence in the Middle East is affecting product use."

What is our primary use case?

Our primary use is implementing the solution for our clients. We are an official partner for Symantec and implement it for clients but we are also using that same solution. Most of the clients are on-premises installations although we do have some clients using cloud and hybrid-cloud deployments.  

So between our clients and their usage, we have experience with representatives who are using all the server deployment types. But the vast majority still stay with the on-premises deployment. This is especially true for banking customers who have stricter requirements for regulatory compliance.  

What is most valuable?

From the commercial side when I'm talking with our customers about Symantec, I talk about how it is a true enterprise-wide solution. Symantec Endpoint Encryption is an all-in-one solution that is completely expandable. With this product, Symantec addresses enterprise concepts. They developed an enterprise solution, they understand and have a good sense of enterprise requirements, they help you manage a huge number of users, they made solutions for the user to sync their enterprise databases and assign data policies, and they have features for blocking access. All the solutions for this Symantec product are integrated into one place. All of these features make it easier to help convince the customer about the quality and utility of this Symantec solution.  

What needs improvement?

From the technical side, I am fine with the features as they are, I am not sure where they might have the need for improvement, and I don't have a solid opinion about it. For the Symantec company and products, they need to engage in more marketing activities in the Middle East because they are not focusing on our needs.  

They need some stability in their own business structure because they have been buying a lot of companies that go out of the market. There are so many changes that Symantec makes that the ordering systems become affected. Sometimes it has been nightmarish to just finish transactions on Symantec systems because of all the product fluctuation. They need to review the channel procedures, their internal procedures from the distributor and have some activities with their consumers to be more aware of the market.  

I think in general that they need to be more conscious of the potential in the Middle East and have a better presence, but I don't know what else they can provide as far as functionality. From my standpoint, all that I need, I found in their solution. The product itself is very good but they have organizational issues.  

For how long have I used the solution?

I've been working with Symantec Endpoint Encryption for longer than 10 years.  

What do I think about the stability of the solution?

There is no problem with product stability. The company stability is another issue. The parent company needs better organization. It does have some effect on the end-user, but that is not the stability of the product itself.  

What's my experience with pricing, setup cost, and licensing?

I personally think that the pricing is fair. On the other hand, and I think it is because the company is not stable from the division perspective that there are some issues in the price list and with the distributor in Egypt. They have some workarounds for this to mitigate the issue. But in the past, the company and the pricing were more stable than nowadays.  

What other advice do I have?

On a scale from one to ten where one is the worst and ten is the best, I would rate Symantec Endpoint Encryption as an eight out of ten. There is room for improvement and I think they need to make more effort here, but I would still totally recommend Symantec products and I'm a fan of Endpoint Encryption as a mature solution.  

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
it_user1152534 - PeerSpot reviewer
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
Good performance for encryption that keeps your data secure and confidential
Pros and Cons
  • "We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
  • "If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution."

What is our primary use case?

We are using this solution to be compliant with CSP.

After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform.

For the Swift operation, we acquired this solution for the servers and the Endpoints.

We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data.

This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.

What is most valuable?

The most valuable feature of this solution is encryption.

The reporting is very important for us. 

It's a well-known solution and the PGP Solution is a good solution with good performance.

Symantec has SONAR for the antivirus and ransomware behavioral analysis in the endpoints.

What needs improvement?

We need to develop a process for this solution. We can't deploy the solution without being assisted by or followed by a process. Also, we need to define the process for administrative responsibilities, and the help desk to be notified for every issue with the solution by the users.

If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution.

We would like the editors or solution providers to present us with a roadmap of the new features and their functionalities. If we were to have this roadmap, we could define our roadmap to integrate the new features.

For how long have I used the solution?

I have been using this solution for one year.

What do I think about the stability of the solution?

This solution is stable.

What do I think about the scalability of the solution?

This solution is scalable.

It's efficient and we discovered that we can extend the perimeters to cover the entire infrastructure.

We have ten people, but we need three more for the succession plan, and a back up for someone who is not available so that there is continuity when managing the solution.

How are customer service and technical support?

We haven't had to contact technical support. The solution is very good for us and it responds to our needs.

Which solution did I use previously and why did I switch?

I used Check Point while I was in Citibank, which was in 2009 and 2010.

How was the initial setup?

The initial setup is not complex, it's easy.

The deployment is easy. You enroll the users and the server, then go to the user and deploy it, reboot the system, then clarify that it is running. From there, you will have an operator to access it.

When the system is rebooted you will be asked for an encryption key. Everyone in the organization has to enter an encryption key.

We have five operators for this platform with four servers.

It is an obligation to deploy it. The scope of compliance, with the goal being to cover all of the infrastructures.

Currently, we outsource the managing of our infrastructure to another company, and we have a dedicated team for our bank. We have the help desk, all of the infrastructure, the networking, the security, and the systems.

What about the implementation team?

We had an integrator to assist us with the implementation and deployment.

Data protect, a Moroccan company that was created in 2009, are also data service providers in all of Africa. 

The created subsidiaries in France, Asia, and other countries. They're a good team that is very helpful and efficient.

What's my experience with pricing, setup cost, and licensing?

The price is very good.

They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options.

What other advice do I have?

Checkpoint has better support. With Symantec, we have subsidiaries involved.

The performance is good and it's efficient.

I would rate this solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1717809 - PeerSpot reviewer
Senior Executive Officer (IT) at a financial services firm with 51-200 employees
Real User
A well-integrated encryption solution, but it was difficult to install
Pros and Cons
  • "It is stable."
  • "It was hard to install and took us about three months."

What is our primary use case?

It is good for encryption and USB devices.

What is most valuable?

The systems are quite integrated.

What needs improvement?

The problem with Symantec is that we have solutions that overlap. So sometimes we don't know which solution to use.

For how long have I used the solution?

We have been using this solution for about five years.

What do I think about the stability of the solution?

it is quite stable. 

What do I think about the scalability of the solution?

Scalability isn't applicable here because it is an endpoint encryption tool. We have about 200 people using the solution. Our usage will increase if we get new employees.

Which solution did I use previously and why did I switch?

We used McAfee Disk Encryption in the past.

How was the initial setup?

It was hard to install and took us about three months. The installation was outsourced.

What's my experience with pricing, setup cost, and licensing?

It has annual licensing.

What other advice do I have?

I rate this solution a seven out of ten, and I recommend doing a POC before implementing it.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1575252 - PeerSpot reviewer
Project Manager at a tech services company with 51-200 employees
Real User
Can be managed from a central point and is stable
Pros and Cons
  • "I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
  • "What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."

What is most valuable?

I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot.

We really liked the vanilla flavor set up. It is stable as well.

What needs improvement?

What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption. With lockdowns and people working from home nowadays because of the COVID-19 pandemic, there's no way to deploy a solution in that manner.

It should be easier to classify documents that should be encrypted, that is, to create policies for documents that should be encrypted. Maybe, it should be according to departments as well.

Customization should be a bit more granular because nowadays, things are very dynamic. Environments are very fluid. So, the policies should reflect that.

In terms of the policies you can apply, there should be a bit more granularity to it, and it should be something that you can turn on and turn off as needed.

For how long have I used the solution?

I had used Symantec Endpoint Encryption for three months. We used the version before the last version.

What do I think about the stability of the solution?

It is a stable solution.

How was the initial setup?

For me, the initial setup was intuitive, but then again, I'd had experience with deploying software for 10 years prior to that point.

Back then, deploying software was not like what it is today; it was much harder. You had to do a lot more customization. However, I have a lot experience, so I wouldn't have been phased by any issue I may have encountered.

What other advice do I have?

I'm in Nigeria, and we also serve Ghana, Sierra Leone, Kenya, and a bit of South Africa. Whenever you're deploying security solutions such as Symantec Endpoint Encryption, there has to be a lot more focus on sensitizing the people who are going to be affected.

We train the IT staff on how to manage it, but we don't train the end-users on what it involves and the advantages of the solution. We also don't inform them of the changes they may have to make in terms of their behavior, how they access data, how they use the data, etc. We need to let them know that it doesn't mean that they are completely secure. The biggest issue about security is human error. So, I think sensitizing the users should also go hand in hand with deployment.

I would rate Symantec Endpoint Encryption at eight on a scale from one to ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user1578519 - PeerSpot reviewer
Specialist: Data Centre Infrastructure at a financial services firm with 1,001-5,000 employees
Real User
Easy to set up and use, reasonably-priced, and easy to upgrade
Pros and Cons
  • "The most valuable feature is the ease of use."
  • "The security could be improved."

What is our primary use case?

I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.

What is most valuable?

The most valuable feature is the ease of use.

The stability is good and it is easy to upgrade.

What needs improvement?

The security could be improved.

For how long have I used the solution?

I have been working with Symantec Endpoint Encryption for six months.

What do I think about the stability of the solution?

The stability is good.

How was the initial setup?

This product is very easy to install.

What about the implementation team?

I can install and set up this solution on my own. It is quick to deploy, taking perhaps five minutes.

What's my experience with pricing, setup cost, and licensing?

The license is not very expensive.

What other advice do I have?

This is absolutely a product that I recommend.

I would rate this solution a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1489089 - PeerSpot reviewer
Manager at a financial services firm with 201-500 employees
Real User
Scalable, mostly stable, and good management
Pros and Cons
  • "Its management is good, and it is also scalable and mostly stable."
  • "Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine."

What is most valuable?

Its management is good, and it is also scalable and mostly stable.

What needs improvement?

Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine.

For how long have I used the solution?

I have been using this solution for four to five years. I am using its latest version.

What do I think about the stability of the solution?

There are minor challenges related to the updates for Windows and Mac systems, but it is mostly stable.

What do I think about the scalability of the solution?

It is scalable.

How are customer service and technical support?

I didn't contact their technical support.

What other advice do I have?

I would recommend this solution. I would rate Symantec Endpoint Encryption an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Symantec Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.