Dell Credant

(3)
3.7 out of 5 stars

CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.

Work for Dell Credant?

Learning about Dell Credant?

We can help you find the solution that fits you best.

Dell Credant Reviews

Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • User Industry
  • For Category
Ratings
Company Size
User Role
User Industry
For Category
Showing 3 Dell Credant reviews
LinkedIn Connections
Dell Credant review by <span>Lauren C.</span>
Lauren C.
Validated Reviewer
Invitation from G2 Crowd
Reviewed On

Secure and easy to learn for Computer backups and restores

What do you like best?

Security is absolutely the best on credant. Can give access to certain users and then make sure any files that must be kept confidential easily.

What do you dislike?

Was a little bit hard to learn coming from no background on computer recovery. I mostly supported the tools, not used them.

What business problems are you solving with the product? What benefits have you realized?

Solving problems when computers need to have information pulled from them and the computer has had a critical error. I supported the team that used Dell credant to give them key files to be able to unlock the computer. It definitely contributed to the security and allowed clients to get their files back.

Sign in to G2 Crowd to see what your connections have to say about Dell Credant
Headshots
Dell Credant review by User in Higher Education
User in Higher Education
Validated Reviewer
Verified Current User
Invitation from G2 Crowd
Reviewed On

Credant, now Dell Data Protection Encryption, not bad

What do you like best?

Encryption is a relative breeze. The external media encryption portion is very slick. I like being able to force USB mass storage devices to be encrypted before they are used on our systems.

The support for EME on systems that aren't owned by us is also very good.

It allows you 2 different options:

Installing an agent on the non company device that allows the user access to the encrypted drive with no additional prompts, after authentication.

Authenticate, do not install any agent, and use a built in explorer window to navigate encrypted files and folders.

I like having both options for users as it allows both an unobtrusive method and a public method when you can't install the agent, such as on a public computer.

What do you dislike?

Unencrypting can be a beast. I find it much easier to just log into the system, transfer all the data off the device, wiping the system and reloading, reencrypting then transferring the files back to be a much less dauntless task than unencryption.

Encrypting a profile begins as soon as a user logs in, however, it stops if the user logs off. It also will not complete if a user logs off and never logs back on. This can be a small headache for technicians, as they need to log on, and stay logged on until their profile is fully encrypted before handing the system back to the user.

Recommendations to others considering the product

It's a pretty good system, I recommend it

What business problems are you solving with the product? What benefits have you realized?

Securing our mobile devices, laptops and USB devices. We have encrypted all physical sources of information to limit our liability in case of loss or theft.

What Mobile Data Security solution do you use?

Thanks for letting us know!
Dell Credant review by User in Non-Profit Organization Management
User in Non-Profit Organization Management
Validated Reviewer
Verified Current User
Invitation from G2 Crowd
Reviewed On

This is the best to Protect

What do you like best?

The ease in deploying & in the great security of my information being transmitted.

What do you dislike?

Some of the program is a little difficult to understand how to operate at first.

Recommendations to others considering the product

This is the best to extend the life of your PC & keep information safe & secure

What business problems are you solving with the product? What benefits have you realized?

Simplifying my security with important information from customers.

Kate avatar
Kate from G2 Crowd

Learning about Dell Credant?

I can help.
* We monitor all Dell Credant reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.