Both the backend server and client components were easy to deploy. We found ourselves up and running in a short amount of time. The solution can be deployed to a number of platforms and easily integrates into a number of different heterogeneous environments. The solution is very policy-centric and provides a number of useful features to control endpoints. Managing the environment and deploying client agents and policies is intuitive, and we were impressed with its enterprise-class look and feel. It is highly customizable and can bolt into existing ZENworks environments with ease.
Although anti-virus and data leakage protection capabilities are not included, virtually every other endpoint security feature is present. Additionally, the ability to use a number of backend databases for events, data reporting and other features is impressive as well.
One feature we noted was the way the solution manages encrypted files and folders. The policy language for encryption enforcement labels these hosts as "safe harbor," which can help organizations understand which hosts can help them comply with breach reporting laws.
Lastly, the Flash-based graphical reporting engine helps to summarize the current state of the endpoints in an easy-to-understand and polished format.