Coming October 25: PeerSpot Awards will be announced! Learn more
2019-03-11T07:21:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 30

What is your primary use case for Symantec Endpoint Encryption?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

16
PeerSpot user
16 Answers
Faisal Mian - PeerSpot reviewer
CTO at ABM Info. tech
Real User
Top 5Leaderboard
2021-11-17T01:00:32Z
17 November 21

We use the solution for endpoint protection. It can help us protect our information.

JW
Forensic Technology Manager at a financial services firm with 1,001-5,000 employees
Real User
Top 5
2021-08-13T12:44:37Z
13 August 21

The solution is primarily used for encryption. It encrypts drives. It protects drives. The information pertaining to the drive is secured.

TG
Specialist: Data Centre Infrastructure at a financial services firm with 1,001-5,000 employees
Real User
Top 20
2021-05-17T14:26:45Z
17 May 21

I used this solution to protect my workstation from malware and other threats such as viruses and worms. It is very useful.

Marbella Ibarra - PeerSpot reviewer
CEO at CT AMERICA
Reseller
Top 5
2020-11-13T13:39:21Z
13 November 20

Our customers are using this solution to protect their laptops, files, and email attachments. The typical requirements are to encrypt the whole hard disk, shared folders, or a network storage area. It is also used to deploy email encryption for some outgoing emails. We have been deploying all the versions that are available for our customers, and we are updating our knowledge year after year. We are deploying this solution on the cloud and on-premises depending on a customer's requirements. We have a few customers who are using on-premise implementations. A few customers have hybrid environments, and a few have decided to go straight to the cloud.

Amit-Gawade - PeerSpot reviewer
Manager at a tech services company with 51-200 employees
Real User
Top 20
2020-10-04T06:40:15Z
04 October 20

We use it on laptops and desktops. We use it for email, file and folder, and command-line encryption depending upon the customer's needs. We are a service provider for Symantec products. We also use it in our company. We have around 50 to 60 users.

PS
CTO at a tech vendor with 51-200 employees
Real User
2020-07-29T07:46:00Z
29 July 20

We primarily use the solution for endpoint security.

Find out what your peers are saying about Broadcom, Microsoft, McAfee and others in Endpoint Encryption. Updated: October 2022.
634,550 professionals have used our research since 2012.
JC
Assistant System Engineer at a tech services company with 51-200 employees
Real User
2020-07-06T08:10:00Z
06 July 20

We are currently working with companies in the financial sector which is why we are using this on-premises solution, because their compliance policies do not allow for cloud-based servers. Our clients are using the full encryptions. They're using Symantec Endpoint Encryption to secure their data. If someone loses their laptop, for example, they can wipe their disk and save their data from ending up with a third party.

TS
TitleGeneral Manager at a tech services company with 501-1,000 employees
Real User
Top 20
2020-01-12T12:02:00Z
12 January 20

This solution is used predominately for data protection. We want to protect our data in case it is lost, or if we are replacing or upgrading hardware.

Mohamed-Hashem - PeerSpot reviewer
Project Manager at Target IS
Real User
2019-12-16T08:13:00Z
16 December 19

Our primary use is implementing the solution for our clients. We are an official partner for Symantec and implement it for clients but we are also using that same solution. Most of the clients are on-premises installations although we do have some clients using cloud and hybrid-cloud deployments. So between our clients and their usage, we have experience with representatives who are using all the server deployment types. But the vast majority still stay with the on-premises deployment. This is especially true for banking customers who have stricter requirements for regulatory compliance.

it_user1243704 - PeerSpot reviewer
System Administraor at a tech services company with 11-50 employees
Real User
2019-12-12T07:48:00Z
12 December 19

We are using three of the product's modules. We are using encryption for messaging, we are using encryption for shared folders and we are using encryption for our hard drives.

it_user1152534 - PeerSpot reviewer
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
2019-11-18T07:22:00Z
18 November 19

We are using this solution to be compliant with CSP. After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform. For the Swift operation, we acquired this solution for the servers and the Endpoints. We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data. This is a pilot project, deployed to be tested. After all of the testing is complete, we can cover the infrastructure.

Mayur Jadhav - PeerSpot reviewer
Senior Security Consultant at a tech services company with 201-500 employees
Real User
Top 10
2019-10-29T09:45:00Z
29 October 19

The primary use case of this solution is for endpoint Security for the Government of the Ministries that we are employed in.

DL
Senior Security Analyst at a tech vendor with 11-50 employees
Real User
2019-03-11T07:21:00Z
11 March 19

The primary use case is just endpoint protection. It is the basis of our whole infrastructure for security staff.

CS
Security Subdirector at a government with 11-50 employees
Real User
2019-03-11T07:21:00Z
11 March 19

The primary use case is to protect from data loss prevention in my company.

JJ
Information System Security Manager at a aerospace/defense firm with 10,001+ employees
Real User
2019-03-11T07:21:00Z
11 March 19

We use it to patch information systems.

KM
IT Operations Manager at HCL Technologies
Real User
2019-03-11T07:21:00Z
11 March 19

The primary use case is for protecting accounts.

Related Questions
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Dec 13, 2021
How does Microsoft BitLocker compare with Symantec Endpoint Encryption? Which is better and why?
See 1 answer
Janet Staver - PeerSpot reviewer
Tech Blogger
13 December 21
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protection. BitLocker consists of agent initialization and robust disk encryption algorithms, and does a good job with reporting on compliance. BitLocker will give you peace of mind by keeping your data safe - especially if employees lose their laptops, or if laptops are stolen - providing you with confidence that no data will be compromised. I like that BitLocker allows you to encrypt removable media as well. However, the encryption key management feature could be improved, and so could its OS compatibility and console management. Some other things I dislike about it are that oftentimes encryption fails to resume after it has been suspended, sometimes it can be time-consuming to encrypt a disk, and encrypting secondary drives can be tricky, to say the least. Symantec Endpoint Encryption’s most valuable feature by far is the messaging and shared folders. It offers great protection and is the perfect solution for large-scale deployments. In addition, it is low-maintenance, which is another big advantage because you rarely need to involve technical support. Moreover, it integrates very well with Symantec Messaging Gateway and Symantec DLP, which works to catch emails and send them to the encryption server which then communicates to the user that confidential information is being shared or sent out, giving administrators the chance to respond appropriately. Symantec Endpoint Encryption’s initial setup and installation is pretty straightforward and easy but the product comes with a high price tag. The only other setback with Symantec is that the program’s disk encryption is not very intuitive or user-friendly when it comes to Microsoft OS updates. Other than that, the product is a stable, reliable, all-in-one solution that is very suitable for enterprise data management. Conclusion: When comparing Microsoft BitLocker and Symantec Endpoint Encryption, they both have their sets of valuable and unique features, but they also both have setbacks. Your choice of product will ultimately be determined by what your organization’s requirements are and which solution can meet your needs best.
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Mar 11, 2020
I am the CEO of a company that provides network security and information security solutions to corporate and enterprise companies. I am currently researching security solutions. What is the biggest difference between Kaspersky Endpoint Security, Trend Micro Endpoint Encryption, Symantec Endpoint Encryption, and McAfee Complete Endpoint Protection?  Thanks! I appreciate the help. 
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 25, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Endpoint Encryption Tools to help ...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Aug 09, 2022
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important. 1) Does the solution employ Foundational Tech...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Jul 11, 2022
Hi community members, As usual, this new Community Spotlight shares with you the latest articles, questions and trending discussions from your peers. Trending See what is trending at the moment and chime in to discuss! Top 8 Extended Detection and Response (XDR) Tools 2022 Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons? What is the...
See 2 comments
Ravi Suvvari - PeerSpot reviewer
Performance and Fault-tolerance Architect with 1,001-5,000 employees
30 May 22
Good very informative
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a financial services firm with 5,001-10,000 employees
11 July 22
Analyze the wave of product at Gartner Hype Cycle. EDR was good in the past. After that, MDR joined the hype and now, XDR is the trend. Wait for more in a couple of months and (sic) know the ZDR!
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 08, 2022
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
See 1 comment
Stuart Berman - PeerSpot reviewer
CTO at a tech company with 11-50 employees
08 April 22
I agree with many of these observations.  A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.  As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.  Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.  Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Apr 04, 2022
Hi peers, This is our new Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members. Trending Is RPA beneficial for a healthcare organization? With the increasing risk of cyber attacks in the west, due to the war in Ukraine, how safe is your data in the cloud? Articles 8 Business Automation Ideas to Save Time and...
Related Articles
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 25, 2022
Top 8 Endpoint Encryption Tools 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to...
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Aug 09, 2022
8 Questions to Ask While Selecting an Endpoint Security Solution for Your Business
If you’re weighing your options for endpoint security solutions, there are many options out there...
Download Free Report
Download our free Endpoint Encryption Report and find out what your peers are saying about Broadcom, Microsoft, McAfee, and more! Updated: October 2022.
DOWNLOAD NOW
634,550 professionals have used our research since 2012.