Trellix Endpoint Security vs Folder Lock
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Phone Support
- Chat
Folder Lock uses a hardware level driver to lock files, folders and drives on Windows, Android, and iOS devices. It offers features such as cloud backup, file sharing, password management, and secure note-taking, all with a focus on protecting user privacy.
Folder Lock uses a hardware level driver to lock files, folders and drives on Windows, Android, and iOS devices. It offers features such as cloud...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Phone Support
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
US$39.95/year
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.2/ 5Features
4.2/ 5Customer Service
4.1/ 5Value for Money
4.0/ 5Ease of Use
4.5/ 5Features
4.4/ 5Customer Service
4.1/ 5Value for Money
4.5/ 5Features
Total features 8
- Access Controls/Permissions
- Activity Tracking
- Application Security
- Compliance Management
- Credential Management
- Data Security
- Device Management
- Encrypted Password Storage
- Encryption
- Network Provisioning
- Real-Time Monitoring
- Secure Data Storage
- Threat Intelligence
- Threat Response
Total features 7
- Access Controls/Permissions
- Activity Tracking
- Application Security
- Compliance Management
- Credential Management
- Data Security
- Device Management
- Encrypted Password Storage
- Encryption
- Network Provisioning
- Real-Time Monitoring
- Secure Data Storage
- Threat Intelligence
- Threat Response