Mobile Armor Review
Anonymous | TrustRadius Reviewer
February 16, 2017

Mobile Armor Review

Score 8 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Mobile Armor

We use the whole disk encryption feature to encrypt all laptop devices. It is used on all laptops in our organization. This protects the data on the disk drives from being accessed in the event the laptop is lost or stolen.
  • Works well in shared use environment where laptops may be used by multiple people. The bypass pre-boot feature eliminates the need for the device to be registered against multiple users.
  • Ability to remote lock or remote wipe laptops.
  • Centrally managed policy deployment.
  • No ability for clients to update software from the server. Software updates require third party software distribution.
  • Policy creation, when integrated with Control Manager, is only accessible by the creator of the policy. Other administrators cannot add devices to the policy.
  • Mobile Armor was packaged in a suite of products, making it a less expensive option.
  • Deployment of Mobile Armor has contributed to regulatory compliance requirements.
  • PGP
We previously used PGP Desktop Encryption. Our main reason for switching was the bypass pre-boot feature in Mobile Armor. We have a lot of shared devices and having to register every user to the device did not work well.
Mobile Armor is well suited anywhere mobile encryption is desired.