Top Rated Dell Data Protection Alternatives
20 Dell Data Protection Reviews
Overall Review Sentiment for Dell Data Protection
Log in to view review sentiment.
Liked that it is supported major OS versions like Windows, Distros of Linux and Mac OS too; easy to deploy and also has good User Interface compared to its peers Review collected by and hosted on G2.com.
Even though it is cost-effective but lacks customer support, I faced several issues after deploying it; the Dell support team took too much time and still did not figure out what was the root cause of the problem. Review collected by and hosted on G2.com.

Dell Credant offers a professional service in the security of the company's data, controlling the access and manipulation of the information stored in the system. Review collected by and hosted on G2.com.
They have not yet failed at any time and aside from that there is nothing that I think I dislike about Dell Credant Review collected by and hosted on G2.com.

Networker will shine when you have huge databases. (Oracle, SQL, Exchange...). When combined with DataDomain, you will be able to run database backups every few minutes for your mission critical databases.
The ease of granular restores is another great point. Restoring a record to the Active Directory, or a table to SQL Database or an email from a mailbox. Review collected by and hosted on G2.com.
one of the biggest headaches of Networker, is its sensitivity for changes in the environment. If you add a node to a cluster, or change an irrelevant configuration to a database server could cause you backups to fail.
the administrator needs to check the jobs on a daily basis. for some backups, several time everyday. Review collected by and hosted on G2.com.
The hardened security for my firm devices, both Software and M.2 Hardware encryption. Review collected by and hosted on G2.com.
There are times when users forget their login PIN and laptop OS crashed then its impossible to recover data. Review collected by and hosted on G2.com.

Dell Data Protection does an outstanding job protecting all the data on my laptop. The data encryption really works! Review collected by and hosted on G2.com.
I really cant think of any negatives to point out Review collected by and hosted on G2.com.
I like Dell Data Protection very much because it helps me to protect my personal computers as well as my work computers against malicious attacks. It has a very user friendly interface. You can protect you passwords, personal information perfectly. Review collected by and hosted on G2.com.
There are some properties of Dell Data Protection. I don't understand some reports that it produces. It is hard to figure out what the problem is and which solution I need to apply. Its price can also be much more affordable. There may be some different price policies. Review collected by and hosted on G2.com.

user friendly ,easy to understand . logically correct . Review collected by and hosted on G2.com.
Users may wish to remove encryption from the system for a variety of reasons. Should the consumer want to encrypt a drive without uninstalling the Dell Data Protection Software, it is possible to do so without complete removal of the product. Review collected by and hosted on G2.com.
Great software for protection and keeping your intranet safe Review collected by and hosted on G2.com.
It’s a little bit out dated, definitely needs a redesign to keep up with today’s standards Review collected by and hosted on G2.com.
The compliance reporting dashboard is terrific as it provides a quick overview of endpoint compliance. Review collected by and hosted on G2.com.
This tool is very taxing on older systems particularly when it does its initial encryption pass of the entire drive. Review collected by and hosted on G2.com.