Senior Information System Officer at a construction company with 51-200 employees
Real User
Top 20
2022-08-26T16:50:05Z
Aug 26, 2022
We are just end users and customers. While we are on-premises right now, we are actually thinking of upgrading to the cloud so that it's easier to manage. I'd rate the solution an eight out of ten.
System Organizer at a translation and localization position with 1-10 employees
Real User
Top 5
2020-02-18T07:41:14Z
Feb 18, 2020
My advice to anybody who is implementing this solution is to have a good knowledge of what it is that you want to do. If all of the policies have been decided with respect to what you want to allow, and what you do not want to allow, then it will be easy to deploy this solution on all of the clients. With any product, there is always something that can be improved. I would rate this solution an eight out of ten.
Team Leader at a university with 201-500 employees
Real User
2019-03-11T07:21:00Z
Mar 11, 2019
The product is versatile, and the company continues to bring out more products. Before we installed the central management console, we were not able to pull any reports of how many threats were being blocked in our environment. So, we couldn't bargain a security budget with management without those reports and data of what is being blocked, showing how much we saved. Therefore, it improved our capabilities of asking for a security budget, as we collected the data that was coming in from all the client devices. Context is louder than volume. You need the data in order to win your board.
What is endpoint security? Endpoint security refers to securing entry points or endpoints of user devices to protect them from malicious attacks or cybersecurity threats and other sophisticated malware. An endpoint can be defined as any device that can be connected to a network, which can include laptops, tablets, mobile devices, smart watches, printers, servers, ATM machines, and even medical devices. It is crucial for organizations to use endpoint security in order to secure their...
I rate ESET Endpoint Encryption an eight out of ten.
Overall, I rate ESET Endpoint Encryption an eight out of ten.
ESET Endpoint Encryption is easy to use. I rate it a ten out of ten.
I would rate it an eight out of ten.
ESET has a good solution, and I would advise others to prepare their systems for installation. I rate ESET Endpoint Encryption nine out of ten.
We are just end users and customers. While we are on-premises right now, we are actually thinking of upgrading to the cloud so that it's easier to manage. I'd rate the solution an eight out of ten.
I rate ESET Endpoint Encryption as an eight out of ten.
ESET is a product that I recommend people switch to for encrypting their documents. I would rate this solution an eight out of ten.
My advice to anybody who is implementing this solution is to have a good knowledge of what it is that you want to do. If all of the policies have been decided with respect to what you want to allow, and what you do not want to allow, then it will be easy to deploy this solution on all of the clients. With any product, there is always something that can be improved. I would rate this solution an eight out of ten.
I would recommend this solution. I would rate this solution a ten out of ten.
The product is versatile, and the company continues to bring out more products. Before we installed the central management console, we were not able to pull any reports of how many threats were being blocked in our environment. So, we couldn't bargain a security budget with management without those reports and data of what is being blocked, showing how much we saved. Therefore, it improved our capabilities of asking for a security budget, as we collected the data that was coming in from all the client devices. Context is louder than volume. You need the data in order to win your board.