2020-03-03T08:47:00Z

What needs improvement with Dell Encryption Enterprise?

Julia Miller - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
3

3 Answers

LM
Real User
Top 20
2022-06-23T09:35:24Z
Jun 23, 2022

I see a lot of room for improvement in a couple of areas. One is that the decryption process is a bit complex and takes a lot of time, depending on how many files you have. If that can be improved, it would be great. Second, whenever there is an operating system-related problem, for example, if the OS gets corrupted and I need to reinstall the operating system, it's very difficult because first, I have to move the data onto another disk. From there, I have to decrypt and install the operating system and then copy it back, which consumes a lot of time. So if that can be improved, it would also be great. One additional feature I would be interested in is an easy way to unlock a file. Whenever a file gets locked or encrypted, the admin should have an easy unlock mechanism or some superior control to get the file unlocked on the fly, which would save a lot of time.

Search for a product comparison
PJ
Real User
2021-02-11T10:27:52Z
Feb 11, 2021

It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user.

MM
Real User
2020-03-03T08:47:00Z
Mar 3, 2020

Some customers have less security in the solution regarding their data. We need to use multiple security applications and a set of security protocols. So security could be improved. Also, if Dell could provide the proposed 32-gigabit Hyperhannel connectivity as some competitors do it would be improved. The features already included are enterprise level. It would be better if they could provide more from the entry-level to mid-range level.

Find out what your peers are saying about Dell Technologies, Microsoft, Thales Cloud Security and others in Endpoint Encryption. Updated: March 2024.
765,386 professionals have used our research since 2012.
Endpoint Encryption
What is endpoint security? Endpoint security refers to securing entry points or endpoints of user devices to protect them from malicious attacks or cybersecurity threats and other sophisticated malware. An endpoint can be defined as any device that can be connected to a network, which can include laptops, tablets, mobile devices, smart watches, printers, servers, ATM machines, and even medical devices. It is crucial for organizations to use endpoint security in order to secure their...
Download Endpoint Encryption ReportRead more