Top Rated Dell Data Protection Alternatives
20 Dell Data Protection Reviews
Overall Review Sentiment for Dell Data Protection
Log in to view review sentiment.

The best part about DDP is that everything I need to manage an endpoint is in one place. I install the software on the client, point it at the server and it does everything for me automatically. Review collected by and hosted on G2.com.
DDP has a habit of locking up endpoints to where I have to get my hands on them to unlock with recovery keys through a PE environment. Review collected by and hosted on G2.com.

The customer service department. They will spend the time to understand the problem and fix it as soon as possible. Review collected by and hosted on G2.com.
It's pretty hard to setup. It also requires a lots of back end configuration. Review collected by and hosted on G2.com.
The added protection to your data when logging in Review collected by and hosted on G2.com.
Love everything about dell products. It has top of the line safety features Review collected by and hosted on G2.com.
Dell credant is basically used to encrypt all of the storage devices. It increases productivity and efficiently encrypts data, Review collected by and hosted on G2.com.
The Product is good. It has negligible downsides but nothing in particular, Review collected by and hosted on G2.com.

Easy to use, install and keep up with. Does it's job. Review collected by and hosted on G2.com.
Updates slowly sometimes, can cause lagging on my system, but it might just be my system. Review collected by and hosted on G2.com.
I like that it is an in house dell solution. Simple to use. Maybe to simple. Review collected by and hosted on G2.com.
I dislike how it changes the how administrators put in their user name and password into UAC. Review collected by and hosted on G2.com.

Security is absolutely the best on credant. Can give access to certain users and then make sure any files that must be kept confidential easily. Review collected by and hosted on G2.com.
Was a little bit hard to learn coming from no background on computer recovery. I mostly supported the tools, not used them. Review collected by and hosted on G2.com.
Lots of features including Full-System Data Protection Solution. (Hardware, Software & Services)
Multi-OS supported. (XP, Vista, and Windows 7)
Local or Remote Management Solution
Focus on ease of use and performance Review collected by and hosted on G2.com.
Continued support of windows xp just encourages bad practices? Review collected by and hosted on G2.com.
Encryption is a relative breeze. The external media encryption portion is very slick. I like being able to force USB mass storage devices to be encrypted before they are used on our systems.
The support for EME on systems that aren't owned by us is also very good.
It allows you 2 different options:
Installing an agent on the non company device that allows the user access to the encrypted drive with no additional prompts, after authentication.
Authenticate, do not install any agent, and use a built in explorer window to navigate encrypted files and folders.
I like having both options for users as it allows both an unobtrusive method and a public method when you can't install the agent, such as on a public computer. Review collected by and hosted on G2.com.
Unencrypting can be a beast. I find it much easier to just log into the system, transfer all the data off the device, wiping the system and reloading, reencrypting then transferring the files back to be a much less dauntless task than unencryption.
Encrypting a profile begins as soon as a user logs in, however, it stops if the user logs off. It also will not complete if a user logs off and never logs back on. This can be a small headache for technicians, as they need to log on, and stay logged on until their profile is fully encrypted before handing the system back to the user. Review collected by and hosted on G2.com.
The ease in deploying & in the great security of my information being transmitted. Review collected by and hosted on G2.com.
Some of the program is a little difficult to understand how to operate at first. Review collected by and hosted on G2.com.