Network Security Architect at a financial services firm with 10,001+ employees
Real User
2020-02-12T17:16:44Z
Feb 12, 2020
The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.
Find out what your peers are saying about Check Point Software Technologies, Microsoft, Broadcom and others in Endpoint Encryption. Updated: August 2025.
Endpoint Encryption is a vital security measure that ensures data remains protected on endpoint devices by encrypting files and drives, safeguarding sensitive information from unauthorized access and breaches.Endpoint Encryption involves the use of algorithms to secure data on devices such as laptops and smartphones, preventing access from unauthorized users. It is crucial for organizations to protect their data integrity and confidentiality, safeguarding information whether the device is...
The installation, setup, and configuration should be easier to complete. In the next release of this solution, I would like to see application identity support.