Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protection. BitLocker consists of agent initialization and robust disk encryption algorithms, and does a good job with reporting on compliance. BitLocker will give you peace of mind by keeping your data safe - especially if employees lose their laptops, or if laptops are stolen - providing you with confidence that no data will be compromised. I like that BitLocker allows you to encrypt removable media as well. However, the encryption key management feature could be improved, and so could its OS compatibility and console management. Some other things I dislike about it are that oftentimes encryption fails to resume after it has been suspended, sometimes it can be time-consuming to encrypt a disk, and encrypting secondary drives can be tricky, to say the least.
Symantec Endpoint Encryption’s most valuable feature by far is the messaging and shared folders. It offers great protection and is the perfect solution for large-scale deployments. In addition, it is low-maintenance, which is another big advantage because you rarely need to involve technical support. Moreover, it integrates very well with Symantec Messaging Gateway and Symantec DLP, which works to catch emails and send them to the encryption server which then communicates to the user that confidential information is being shared or sent out, giving administrators the chance to respond appropriately. Symantec Endpoint Encryption’s initial setup and installation is pretty straightforward and easy but the product comes with a high price tag. The only other setback with Symantec is that the program’s disk encryption is not very intuitive or user-friendly when it comes to Microsoft OS updates. Other than that, the product is a stable, reliable, all-in-one solution that is very suitable for enterprise data management.
Conclusion: When comparing Microsoft BitLocker and Symantec Endpoint Encryption, they both have their sets of valuable and unique features, but they also both have setbacks. Your choice of product will ultimately be determined by what your organization’s requirements are and which solution can meet your needs best.
I am the CEO of a company that provides network security and information security solutions to corporate and enterprise companies.
I am currently researching security solutions. What is the biggest difference between Kaspersky Endpoint Security, Trend Micro Endpoint Encryption, Symantec Endpoint Encryption, and McAfee Complete Endpoint Protection?
Thanks! I appreciate the help.
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 8 Endpoint Encryption Tools to help ...
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important.
1) Does the solution employ Foundational Tech...
Hi community members,
As usual, this new Community Spotlight shares with you the latest articles, questions and trending discussions from your peers.
See what is trending at the moment and chime in to discuss!
Top 8 Extended Detection and Response (XDR) Tools 2022
Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
What is the...
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
I agree with many of these observations.
A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.
As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.
Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.
Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
This is our new Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members.
Is RPA beneficial for a healthcare organization?
With the increasing risk of cyber attacks in the west, due to the war in Ukraine, how safe is your data in the cloud?
8 Business Automation Ideas to Save Time and...