I've been a happy user of BitLocker for months now. If Veracrypt ever bothers supporting SecureBoot out of the box, I'll consider switching. Until then, nah.
!!! WARNING !!! - Wake Up You All... Unlocked Disk Encryption Volumes (like VeraCrypt etc.) say mapped on drive E:\ allows any running malware, spyware, virus etc. to read all your files in the undecrypted mapped drive E:\ How come this doesn't raise any alarm bells here by anyone? The Black Budget (NSA billions) have their spyware foot in the door at Microsoft, Apple & Linux for a long time already. I've seen Google Chrome log my Desktop activities (encrypted data patterns) and send it to Google webservers! IT IS SPYWARE and it can read all your files in your unlocked volume mapped drive. Sniffing on I/O/ encrypted data patterns and shortly after seeing those same data patterns being sent to Google webservers. Operating Systems today are packed with free espionage software scanning your personal data all the time. Read my lips: "Disk Encryption no longer protects !!!" This goes for all Disk Encryption software. It only offers protection if someone finds your laptop and tries to login to your laptop with a locked volume. These days threats do not really come from people accessing a logged off system, but from spyware background processes running alongside your desktop session reading your unlocked files, it's that simple! Only (One-Time Pad) File Encryption protects at all times (even during runtime). This is why FinalCrypt was built. To protect at all times, even during RUNTIME !!! http://www.finalcrypt.org/