We performed a comparison between Check Point Full Disk Encryption Software Blade and Cisco Secure Endpoint based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, McAfee and others in Endpoint Encryption."End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"It is a cross-platform tool."
"It keeps the devices well monitored."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The solution provides complete security for one's workstation."
"It helps us maximize the operational efficiency and performance of our activities."
"It has addressed storage and data transfer demands efficiently."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful."
"The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The ability to detonate a particular problem in a sandbox environment and understand what the effects are, is helpful. We're trying, for example, to determine, when people send information in, if an attachment is legitimate or not. You just have to open it. If you can do that in a secure sandbox environment, that's an invaluable feature. What you would do otherwise would be very risky and tedious."
"The response time for technical support could be faster."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"They should improve the interface and make it a little more user-friendly."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The cost of maintaining the system is high for personal use."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"I would like to bring centralized management to mobile devices."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"We would like to have an API integration with a SIEM solution, because as far as I know, it currently hasn't yet been released."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"I would like to see integration with Cisco Analytics."
"Integration and dashboard are areas with certain shortcomings in Cisco Secure Endpoint."
"It is an expensive solution."
"It's pretty good as it is, but its cost could be improved."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"The reporting and analytics areas of the solution need to be improved."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Cisco Secure Endpoint is ranked 9th in Endpoint Protection Platform (EPP) with 45 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Cisco Secure Endpoint is rated 8.6. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Cisco Secure Endpoint writes "Makes it possible to see a threat once and block it across all endpoints and your entire security platform". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker and McAfee Complete Data Protection, whereas Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon, Check Point Harmony Endpoint and VMware Carbon Black Endpoint.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.