# Microsoft BitLocker, Symantec Encryption vs Kaspersky Next Optimum Comparison

| | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Star Rating** | 4.6 out of 5 | 3.7 out of 5 | 4.3 out of 5 | 
| **Total Reviews** | 25 | 40 | 206 | 
| **Largest Market Segment** | Small-Business (41.7% of reviews) | Enterprise (55.6% of reviews) | Mid-Market (40.8% of reviews) | 
| **Entry Level Price** | No pricing available | No pricing available | $77 node/year | 

---
## Top Pros & Cons

### Microsoft BitLocker

Pros:
- Ease of Use (13 reviews)
- Encryption Security (7 reviews)

Cons:
- Key Recovery (7 reviews)
- Limited OS Compatibility (5 reviews)

### Symantec Encryption


Cons:
- Difficult Navigation (1 reviews)

### Kaspersky Next Optimum

Pros:
- Blocking (5 reviews)
- Ease of Use (5 reviews)

Cons:
- High Resource Usage (6 reviews)
- Slow Performance (5 reviews)

---
## Ratings Comparison
| Rating | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
  | **Meets Requirements** | 9.0 (23 reviews) | 8.7 (28 reviews) | 8.9 (172 reviews) | 
  | **Ease of Use** | 9.1 (24 reviews) | 7.8 (28 reviews) | 8.6 (173 reviews) | 
  | **Ease of Setup** | 9.1 (23 reviews) | 7.8 (17 reviews) | 8.2 (70 reviews) | 
  | **Ease of Admin** | 8.6 (12 reviews) | 8.0 (16 reviews) | 8.4 (65 reviews) | 
  | **Quality of Support** | 8.5 (16 reviews) | 8.0 (23 reviews) | 8.4 (167 reviews) | 
  | **Has the product been a good partner in doing business?** | 8.9 (9 reviews) | 7.8 (15 reviews) | 8.2 (65 reviews) | 
  | **Product Direction (% positive)** | 9.5 (24 reviews) | 6.7 (28 reviews) | 8.5 (174 reviews) | 

---
## Pricing

### Microsoft BitLocker

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Symantec Encryption

#### Entry-Level Pricing

No pricing available

#### Free Trial

No information available

### Kaspersky Next Optimum

#### Entry-Level Pricing

Plan: Advanced

Price: $77 node/year

Description: Advanced combines Next Generation protection with role-based management and automation for a unique security posture, driving encryption adoption and improving efficiency for businesses of all sizes.


[Browse all 3 editions](https://www.g2.com/products/kaspersky-next-optimum/pricing)

#### Free Trial

Yes

---
## Features Comparison By Category

### Network Sandboxing

| Product | Score | Reviews |
|---|---|---|
| **Microsoft BitLocker** | N/A | N/A |
| **Symantec Encryption** | N/A | N/A |
| **Kaspersky Next Optimum** | 8.7/10 | 13 |

#### Sandbox

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Sandbox** | Not enough data | Not enough data | 9.0 (13 reviews) | 

#### Evaluation

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Malware Evaluation** | Not enough data | Not enough data | 9.0 (13 reviews) | 
| **Automatic Submission** | Not enough data | Not enough data | 8.6 (12 reviews) | 
| **Automatic Evaluation** | Not enough data | Not enough data | 8.5 (12 reviews) | 
| **Malware Probability Scores** | Not enough data | Not enough data | 8.6 (12 reviews) | 

### Endpoint Protection Platforms

| Product | Score | Reviews |
|---|---|---|
| **Microsoft BitLocker** | N/A | N/A |
| **Symantec Encryption** | N/A | N/A |
| **Kaspersky Next Optimum** | 8.9/10 | 62 |

#### Administration

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Compliance** | Not enough data | Not enough data | 8.9 (50 reviews) | 
| **Web Control** | Not enough data | Not enough data | 8.9 (50 reviews) | 
| **Application Control** | Not enough data | Not enough data | 8.9 (50 reviews) | 
| **Asset Management** | Not enough data | Not enough data | 8.9 (48 reviews) | 
| **Device Control** | Not enough data | Not enough data | Feature Not Available | 

#### Functionality

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **System Isolation** | Not enough data | Not enough data | 8.8 (48 reviews) | 
| **Firewall** | Not enough data | Not enough data | 8.8 (48 reviews) | 
| **Endpoint Intelligence** | Not enough data | Not enough data | 8.9 (50 reviews) | 
| **Malware Detection** | Not enough data | Not enough data | 9.1 (51 reviews) | 

#### Analysis

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Automated Remediation** | Not enough data | Not enough data | 8.9 (48 reviews) | 
| **Incident Reports** | Not enough data | Not enough data | 9.0 (49 reviews) | 
| **Behavioral Analysis** | Not enough data | Not enough data | 8.7 (49 reviews) | 

### Email Encryption

| Product | Score | Reviews |
|---|---|---|
| **Microsoft BitLocker** | N/A | N/A |
| **Symantec Encryption** | N/A | N/A |
| **Kaspersky Next Optimum** | N/A | N/A |

#### Encryption Techniques - Email Encryption

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Encryption Algorithms** | Not enough data | Not enough data | Not enough data | 
| **Transport Encryption** | Not enough data | Not enough data | Not enough data | 
| **End-to-End Encryption** | Not enough data | Not enough data | Not enough data | 

#### Authentication, Verification, and Access Controls - Email Encryption

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Revocation Mechanisms** | Not enough data | Not enough data | Not enough data | 
| **Access Controls** | Not enough data | Not enough data | Not enough data | 
| **Digital Signatures** | Not enough data | Not enough data | Not enough data | 
| **Certificate Authorities** | Not enough data | Not enough data | Not enough data | 

#### Security Enhancements and Auditing - Email Encryption

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Malware Scanning** | Not enough data | Not enough data | Not enough data | 
| **Reporting** | Not enough data | Not enough data | Not enough data | 
| **Audit Trails** | Not enough data | Not enough data | Not enough data | 
| **Data Loss Prevention (DLP)** | Not enough data | Not enough data | Not enough data | 

#### Integration, Compatibility, and Usability - Email Encryption

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **User-Friendly Interfaces** | Not enough data | Not enough data | Not enough data | 
| **APIs and SDKs** | Not enough data | Not enough data | Not enough data | 
| **Email Client Integration** | Not enough data | Not enough data | Not enough data | 
| **Automation** | Not enough data | Not enough data | Not enough data | 

### Encryption

| Product | Score | Reviews |
|---|---|---|
| **Microsoft BitLocker** | 7.6/10 | 23 |
| **Symantec Encryption** | 7.8/10 | 11 |
| **Kaspersky Next Optimum** | 9.3/10 | 9 |

#### Encryption

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Email Encryption** | 5.3 (21 reviews) | Not enough data | 9.7 (6 reviews) | 
| **Messaging Encryption** | 5.3 (20 reviews) | Not enough data | 9.2 (6 reviews) | 
| **File Transfer Encryption** | 6.8 (19 reviews) | 8.3 (6 reviews) | 9.7 (6 reviews) | 
| **Data Encryption** | 8.3 (20 reviews) | 8.7 (9 reviews) | 9.5 (7 reviews) | 
| **Document Encryption** | 7.8 (19 reviews) | Not enough data | 9.5 (7 reviews) | 
| **Full-Disk Encryption** | 9.5 (19 reviews) | 8.8 (8 reviews) | 9.8 (7 reviews) | 

#### Compliance

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Authentication** | 7.5 (19 reviews) | 8.6 (6 reviews) | 8.9 (6 reviews) | 
| **Policy Enforcement** | 8.5 (20 reviews) | 8.1 (6 reviews) | 9.0 (7 reviews) | 
| **Access Management** | 7.9 (18 reviews) | 8.3 (6 reviews) | 9.3 (7 reviews) | 

#### Management

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Backup** | 8.4 (19 reviews) | 6.7 (6 reviews) | 9.4 (6 reviews) | 
| **Recovery** | 8.4 (20 reviews) | 6.7 (6 reviews) | 9.3 (7 reviews) | 
| **File Management** | 7.7 (19 reviews) | 6.7 (6 reviews) | 9.0 (7 reviews) | 
| **Anomaly Detection** | 6.9 (18 reviews) | 6.7 (5 reviews) | 9.0 (7 reviews) | 

### Endpoint Protection

| Product | Score | Reviews |
|---|---|---|
| **Microsoft BitLocker** | N/A | N/A |
| **Symantec Encryption** | N/A | N/A |
| **Kaspersky Next Optimum** | N/A | N/A |

#### System Control

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Device Control** | Not enough data | Not enough data | Not enough data | 
| **Web Control** | Not enough data | Not enough data | Not enough data | 
| **Application Control** | Not enough data | Not enough data | Not enough data | 
| **Asset Management** | Not enough data | Not enough data | Not enough data | 
| **System Isolation** | Not enough data | Not enough data | Not enough data | 

#### Vulnerability Prevention

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Endpoint Intelligence** | Not enough data | Not enough data | Not enough data | 
| **Firewall** | Not enough data | Not enough data | Not enough data | 
| **Malware Detection** | Not enough data | Not enough data | Not enough data | 

#### Security Management

| Feature | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Incident Reports** | Not enough data | Not enough data | Not enough data | 
| **Security Validation** | Not enough data | Not enough data | Not enough data | 
| **Compliance ** | Not enough data | Not enough data | Not enough data | 

---
## Categories
**Shared Categories (1):** [Encryption Software](https://www.g2.com/categories/encryption-software)


**Unique to Symantec Encryption (1):** [Email Encryption Software](https://www.g2.com/categories/email-encryption)

**Unique to Kaspersky Next Optimum (2):** [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms), [Network Sandboxing Software](https://www.g2.com/categories/network-sandboxing)


---
## Reviewer Demographics

### By Company Size

| Segment | Microsoft BitLocker | Symantec Encryption | Kaspersky Next Optimum | 
|---|---|---|---|
| **Small-Business** | 41.7% | 16.7% | 30.9% | 
| **Mid-Market** | 25.0% | 27.8% | 40.8% | 
| **Enterprise** | 33.3% | 55.6% | 28.3% | 

### By Industry

#### Microsoft BitLocker

- **Computer Software:** 16.7%
- **Information Technology and Services:** 12.5%
- **Hospital &amp; Health Care:** 12.5%
- **Non-Profit Organization Management:** 8.3%
- **Computer &amp; Network Security:** 8.3%
- **Consulting:** 4.2%
- **Retail:** 4.2%
- **Printing:** 4.2%
- **Insurance:** 4.2%
- **Information Services:** 4.2%
- **Other:** 20.8%

#### Symantec Encryption

- **Information Technology and Services:** 22.2%
- **Computer Software:** 11.1%
- **Internet:** 8.3%
- **Insurance:** 8.3%
- **Publishing:** 5.6%
- **Marketing and Advertising:** 5.6%
- **Hospital &amp; Health Care:** 5.6%
- **Animation:** 2.8%
- **Biotechnology:** 2.8%
- **Chemicals:** 2.8%
- **Other:** 25.0%

#### Kaspersky Next Optimum

- **Information Technology and Services:** 22.3%
- **Computer Software:** 5.7%
- **Accounting:** 4.7%
- **Financial Services:** 4.7%
- **Computer &amp; Network Security:** 3.6%
- **Internet:** 3.6%
- **Hospital &amp; Health Care:** 3.1%
- **Computer Networking:** 3.1%
- **Telecommunications:** 2.6%
- **Health, Wellness and Fitness:** 2.6%
- **Other:** 44.0%

---
## Alternatives

### Alternatives to Microsoft BitLocker

- [VeraCrypt](https://www.g2.com/products/veracrypt/reviews) — 4.5/5 stars (51 reviews)
- [FileVault](https://www.g2.com/products/filevault/reviews) — 4.3/5 stars (35 reviews)
- [Sophos Intercept X](https://www.g2.com/products/sophos-sophos-intercept-x/reviews) — 3.9/5 stars (34 reviews)
- [Dell Data Protection](https://www.g2.com/products/dell-data-protection/reviews) — 4.1/5 stars (21 reviews)
- [Folder Lock](https://www.g2.com/products/folder-lock/reviews) — 4.5/5 stars (16 reviews)
- [DiskCryptor](https://www.g2.com/products/diskcryptor/reviews) — 4.4/5 stars (10 reviews)
- [Cryptomator](https://www.g2.com/products/cryptomator/reviews) — 4.1/5 stars (12 reviews)
- [GnuPG](https://www.g2.com/products/gnupg/reviews) — 4.2/5 stars (11 reviews)
- [Signal](https://www.g2.com/products/open-whisper-systems-signal/reviews) — 4.4/5 stars (453 reviews)
- [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews) — 4.4/5 stars (526 reviews)

### Alternatives to Symantec Encryption

- [VeraCrypt](https://www.g2.com/products/veracrypt/reviews) — 4.5/5 stars (51 reviews)
- [Sophos Intercept X](https://www.g2.com/products/sophos-sophos-intercept-x/reviews) — 3.9/5 stars (34 reviews)
- [Signal](https://www.g2.com/products/open-whisper-systems-signal/reviews) — 4.4/5 stars (453 reviews)
- [Virtru Email Encryption](https://www.g2.com/products/virtru-email-encryption/reviews) — 4.4/5 stars (407 reviews)
- [Proofpoint Core Email Protection](https://www.g2.com/products/proofpoint-core-email-protection/reviews) — 4.6/5 stars (584 reviews)
- [Paubox](https://www.g2.com/products/paubox/reviews) — 4.9/5 stars (552 reviews)
- [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews) — 4.6/5 stars (1196 reviews)
- [Progress MOVEit](https://www.g2.com/products/progress-moveit/reviews) — 4.4/5 stars (526 reviews)
- [BlackBerry UEM](https://www.g2.com/products/blackberry-uem/reviews) — 3.8/5 stars (376 reviews)
- [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews) — 4.6/5 stars (511 reviews)

### Alternatives to Kaspersky Next Optimum

- [ThreatDown](https://www.g2.com/products/threatdown/reviews) — 4.6/5 stars (1083 reviews)
- [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) — 4.6/5 stars (976 reviews)
- [Sophos Endpoint](https://www.g2.com/products/sophos-endpoint/reviews) — 4.7/5 stars (825 reviews)
- [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews) — 4.4/5 stars (553 reviews)
- [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews) — 4.5/5 stars (532 reviews)
- [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) — 4.7/5 stars (402 reviews)
- [Microsoft Defender for Endpoint](https://www.g2.com/products/microsoft-defender-for-endpoint/reviews) — 4.4/5 stars (310 reviews)
- [Check Point Harmony Endpoint](https://www.g2.com/products/check-point-harmony-endpoint/reviews) — 4.5/5 stars (284 reviews)
- [FortiClient](https://www.g2.com/products/forticlient/reviews) — 4.4/5 stars (274 reviews)
- [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) — 4.7/5 stars (201 reviews)

---
## Top Discussions

### Microsoft BitLocker

No discussions available for this product.

### Symantec Encryption

No discussions available for this product.

### Kaspersky Next Optimum

- Title: [What is endpoint security software?](https://www.g2.com/discussions/kaspersky-endpoint-security-for-business-what-is-endpoint-security-software) — 1 comment
  > **Top comment:** "Endpoint security software is software designed to protect your endpoints, or devices used for daily business operations such as desktop PCs, laptops,..."
- Title: [now Kaspersky Endpoint Security is really heavy for the pc when i do the scan?](https://www.g2.com/discussions/now-kaspersky-endpoint-security-is-really-heavy-for-the-pc-when-i-do-the-scan) — 1 comment, 1 upvote
  > **Top comment:** "It depends on your system specification. You can  check the scan settings and select deep scan once a week when system remain idle"
- Title: [What is the best way to configure kaspersky to achieve the balance, security and performance](https://www.g2.com/discussions/what-is-the-best-way-to-configure-kaspersky-to-achieve-the-balance-security-and-performance) — 1 comment, 1 upvote
  > **Top comment:** "There is no one balance to achieve security and performance.  Your own risk tolerance will determine what level of security you need, and that will have a..."
- Title: [What is the purpose of cloud-based protection?](https://www.g2.com/discussions/cloud-based-protection) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "Most IT security vendors use the cloud to improve protection levels. Hybrid protection (antivirus databases + proactive defense + the cloud) is the most..."
- Title: [What is the ‘cloud’?](https://www.g2.com/discussions/what-is-the-cloud) — 1 comment, 1 upvote *(includes official response)*
  > **Top comment:** "It is a service that runs on a company’s servers rather than on user devices and which can be used over the Internet from anywhere in the world. Examples of..."

---
**Source:** [G2.com](https://www.g2.com) | [Comparison Page](https://www.g2.com/compare/microsoft-bitlocker-vs-symantec-encryption-vs-kaspersky-next-optimum)

