Dell Credant


CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.

Work for Dell Credant?

Learning about Dell Credant?

We can help you find the solution that fits you best.

Find the Right Product

Dell Credant Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Company Size
User Role
For Category
Showing 3 Dell Credant reviews
LinkedIn Connections
Dell Credant review by Lauren C.
Lauren C.
Validated Reviewer
Review Source

"Secure and easy to learn for Computer backups and restores"

What do you like best?

Security is absolutely the best on credant. Can give access to certain users and then make sure any files that must be kept confidential easily.

What do you dislike?

Was a little bit hard to learn coming from no background on computer recovery. I mostly supported the tools, not used them.

What business problems are you solving with the product? What benefits have you realized?

Solving problems when computers need to have information pulled from them and the computer has had a critical error. I supported the team that used Dell credant to give them key files to be able to unlock the computer. It definitely contributed to the security and allowed clients to get their files back.

Sign in to G2 Crowd to see what your connections have to say about Dell Credant
Dell Credant review by User in Higher Education
User in Higher Education
Validated Reviewer
Verified Current User
Review Source

"Credant, now Dell Data Protection Encryption, not bad"

What do you like best?

Encryption is a relative breeze. The external media encryption portion is very slick. I like being able to force USB mass storage devices to be encrypted before they are used on our systems.

The support for EME on systems that aren't owned by us is also very good.

It allows you 2 different options:

Installing an agent on the non company device that allows the user access to the encrypted drive with no additional prompts, after authentication.

Authenticate, do not install any agent, and use a built in explorer window to navigate encrypted files and folders.

I like having both options for users as it allows both an unobtrusive method and a public method when you can't install the agent, such as on a public computer.

What do you dislike?

Unencrypting can be a beast. I find it much easier to just log into the system, transfer all the data off the device, wiping the system and reloading, reencrypting then transferring the files back to be a much less dauntless task than unencryption.

Encrypting a profile begins as soon as a user logs in, however, it stops if the user logs off. It also will not complete if a user logs off and never logs back on. This can be a small headache for technicians, as they need to log on, and stay logged on until their profile is fully encrypted before handing the system back to the user.

Recommendations to others considering the product

It's a pretty good system, I recommend it

What business problems are you solving with the product? What benefits have you realized?

Securing our mobile devices, laptops and USB devices. We have encrypted all physical sources of information to limit our liability in case of loss or theft.

What Mobile Data Security solution do you use?

Thanks for letting us know!
Dell Credant review by User in Non-Profit Organization Management
User in Non-Profit Organization Management
Validated Reviewer
Verified Current User
Review Source

"This is the best to Protect"

What do you like best?

The ease in deploying & in the great security of my information being transmitted.

What do you dislike?

Some of the program is a little difficult to understand how to operate at first.

Recommendations to others considering the product

This is the best to extend the life of your PC & keep information safe & secure

What business problems are you solving with the product? What benefits have you realized?

Simplifying my security with important information from customers.

There are not enough reviews of Dell Credant for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

ZoneAlarm Pro Firewall Logo
ZoneAlarm Pro Firewall
ZoneAlarm, a Check Point Software Technologies, Inc. Company, is a world leader in mobile privacy protection (VPN & antivirus) and consumer Internet security.
Symantec Endpoint Protection Mobile Logo
Symantec Endpoint Protection Mobile
Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
Salesforce Platform: Shield Logo
Salesforce Platform: Shield
Salesforce Shield offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
BlackBerry Blend Logo
BlackBerry Blend
Boundless connectivity
ESET Mobile Security Logo
ESET Mobile Security
Light-footprint endpoint security including antimalware, anti-phishing and anti-theft
zANTI Logo
zANTI™ is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
Appknox Logo
Appknox is a mobile security company that specializes in helping businesses and developers make their mobile applications more secure.
NetMotion Mobility Logo
NetMotion Mobility
Secure, Managed Connectivity for Your Mobile Deployment
AirCheck Wi-Fi Tester for Android Logo
AirCheck Wi-Fi Tester for Android
Smart Wi-Fi Troubleshooting and Deployment App
WinMagic Logo
WinMagic provides the world's most secure, manageable and easy-to-use data encryption solutions.
Show more
Kate from G2 Crowd

Learning about Dell Credant?

I can help.
* We monitor all Dell Credant reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.