Top Rated Symantec Encryption Alternatives
39 Symantec Encryption Reviews
Overall Review Sentiment for Symantec Encryption
Log in to view review sentiment.
Sonar Protection Application and Device control Review collected by and hosted on G2.com.
Most of the section or fields "search" facility is missing Review collected by and hosted on G2.com.
It is ease to install, configure, and use to encrypt network folders and files. Review collected by and hosted on G2.com.
You need to track all user's private keys for access to encrypted folders and files. Review collected by and hosted on G2.com.

They have 128 bit and 256 bit encryption. An application on your mobile lets you to have security code instantly. Review collected by and hosted on G2.com.
Nothing major. However, it would be great to have added layer of security for devices. Review collected by and hosted on G2.com.
User experience is generally transparent so there is only minimal support. The system does not put too heavy a load on the servers. Review collected by and hosted on G2.com.
In a roaming profile environment, I have found the encryption key files to be a bit fiddely and sometimes subject to corruption. Review collected by and hosted on G2.com.

Ease of installation. Offline support, Low CPU and Memory needs Review collected by and hosted on G2.com.
Matter of how to allow unencrypted Mail also upgrade can be quite challenging at times Review collected by and hosted on G2.com.

Symantec desktop behaves on a seamless fashion, allowing users a level of comfort and awareness that mail received is not fraudulent and links are safe to open. This saves time, allows better focus and keeps users on track for meeting compliance goals for Content Management. Review collected by and hosted on G2.com.
The internal processes managing the level of filtering and the modified whitelisting can be completed and needs to be well managed by IT services. Review collected by and hosted on G2.com.
The fact that I have moved to another product. Review collected by and hosted on G2.com.
Everything. The product is hard to manage, slow, and support is almost non-existent. I don't have enough room to put into words everything that is wrong with the product. I just doesn't work correctly and has this nasty habit of breaking in ways that even Symantec can't explain(when you can get them on the phone anyway). The bundled with the cost of the application, it is just a good application. Review collected by and hosted on G2.com.
Good security design and features. Very effective product in solving security issues.. A lot of companies are using it since they trust the security design and features of the product. Review collected by and hosted on G2.com.
There can always be more features bundled in. Review collected by and hosted on G2.com.


I love that my emails are secure and threats are caught quickly and efficiently. Review collected by and hosted on G2.com.
I cannot think of a feature I dislike about this product. Very useful! Review collected by and hosted on G2.com.