Alternativas de Zip Security Mejor Valoradas
12 Zip Security Reseñas
Sentimiento General de la Reseña para Zip Security
Inicia sesión para ver el sentimiento de la revisión.

Zip Security enables hyper-simple rollouts of enterprise quality MDM and EDR capabilities rapidly. You do not need to choose to manage multiple operating systems in one tool that is really good at one OS and bad at others. Zip Security makes it so you do not have to choose. With their approach, you can ensure you have FULL COVERAGE of all systems in your environment and that they are protected correctly. The cost of Zip is as affordable of buying these platforms directly, but then the cost of implementation and management is exponentially hire if you do it yourself. The support team at Zip is so attentative they feel like internal staff. They are there to get you safe, and keep you safe. Zip Security plays well with the compliance and GRC tools to help customers achieve and maintain their SOC 2, ISO 27001, or the like. Reseña recopilada por y alojada en G2.com.
As a seasoned security professional, I often find many areas I would like to see get better from providers. After over a year with multiple customers on Zip Security, I have zero complaints. Reseña recopilada por y alojada en G2.com.
As a non-IT person in charge of IT and security, ZipSec has been there to help me set things up, answer questions, and more. I was able to connect alerts to Slack so I can easily see when compliance was an issue and follow up directly with people. They have gone above and beyond. Reseña recopilada por y alojada en G2.com.
Nothing really - the team understood my lack of experience and helped me all the way through. Reseña recopilada por y alojada en G2.com.
I have used it when i started working as a fresher, to encrypt my zip files. It can also used to encrypt rar files, but i completely used it to encrypt my confidential zip files.
I also used to decrypt the encrypted file.
Hence, it helped me well for encryption and decryption of my project's confidential files. Reseña recopilada por y alojada en G2.com.
If i forget the password of my decrypted zip file, it is very difficult to recover it back.
This is the only disadvantage i faced so far. Reseña recopilada por y alojada en G2.com.

The team is responsive, helpful, and professional. The product is constantly being improved. Their features include MDM and EDR, which is valuable and helpful for a company which needs to outsource its IT and security. Reseña recopilada por y alojada en G2.com.
N/A - the product continues to improve every quarter. Reseña recopilada por y alojada en G2.com.

Permitir que nuestro programa de seguridad sea interno. El equipo de atención al cliente es transparente, también incorpora nuevas funciones y comentarios. ¡El servicio de atención al cliente es de primera categoría! Reseña recopilada por y alojada en G2.com.
Hay algunos ensayos y errores mientras fortalecen su plataforma, pero se ajustan rápidamente basándose en la retroalimentación/la experiencia del usuario. Están trabajando para convertirse en una potencia y están haciendo un progreso tremendo. Reseña recopilada por y alojada en G2.com.

Zip Security is easy to use and it's best features is protect our files using encypted password. Reseña recopilada por y alojada en G2.com.
it is does not support cloud based aplications. Reseña recopilada por y alojada en G2.com.

Zip security provides device management, endpoint security and security monitoring. Best thing is that it's an unified solution for security. Reseña recopilada por y alojada en G2.com.
I don't like user interface and customer support of Zip security. Reseña recopilada por y alojada en G2.com.

La seguridad de Zip ha sido una forma útil de implementar MDM a nuestro equipo sin la carga organizativa. No tenemos que preocuparnos por las recertificaciones y el flujo de trabajo de inscripción es excelente para cuando los empleados actualizan dispositivos para asegurarnos de tener una cobertura completa.
El equipo ha sido fantástico, uno de los más centrados en el cliente que he visto. Una experiencia de 10/10 hasta ahora. Reseña recopilada por y alojada en G2.com.
Nada realmente que destacar específicamente aquí, la plataforma funciona bien y es intuitiva de usar. Reseña recopilada por y alojada en G2.com.

Threat detection of anomalies in real time and helps to take action within the timeline to either mitigate or prevent the incidents Reseña recopilada por y alojada en G2.com.
It would be better if we can configure the solution inhouse instead of cloud based solutions Reseña recopilada por y alojada en G2.com.
They make a complex implementation painless.
We use Zip to procure, configure and manage CrowdStrike. Thanks to Zip, CrowdStrike rollout was easy and automatically pushed to devices in our fleet. The product and customer support teams are very quick to respond to questions and attentive to our feedback on ways to improve the platform.
We've seen new features rolled out very quickly based on our feedback. Reseña recopilada por y alojada en G2.com.
there is nothing to dislike. I can't wait to see how they will keep growing. Reseña recopilada por y alojada en G2.com.