What is our primary use case?
Check Point Pointsec was one of the solutions we used when we were on-premise; it is an endpoint encryption solution that we used to protect confidential data on laptops, desktops, and removable media. With this, we were able to secure many devices and safeguard information. When we did the migration to the Azure cloud we had to make changes in our security tools, and one that we changed was this one for one of the same brand (since we had used it for many years and we already had the experience and support with Check Point). This is why, in the end, we acquired Check Point Full Disk Encryption Software.
How has it helped my organization?
In the first few years, we needed a tool to encrypt Check Point Pointsec devices. It was one of the first tools we acquired. It was an excellent tool with many functionalities that helped to be able to manage all the security in the aforementioned endpoint devices.
Previously, we were able to ensure that our workers were safe from theft or hacking. It also helped us to standardize more centralized management, helping us to improve security standards.
What is most valuable?
Some features that were commonly considered valuable are:
- Full disk encryption helps us ensure that data stored on a device is encrypted.
- Removable media encryption helps us encrypt data stored on removable media, such as USB drives and external hard drives.
- Centralized management helps manage encryption policies and keys from a central location.
- Compliance reporting helps us comply with regulatory requirements, such as HIPAA and PCI-DSS.
These and other features made Check Point Pointsec an excellent tool for security and compliance.
What needs improvement?
The tool presented many good features. However, they could have implemented some to improve it at the time. Some could be:
- Integration with other security solutions would have made it possible to integrate with solutions such as detection and prevention in order to have more breadth and economize on tools.
- An easier-to-use interface. The UI was one of the most difficult points to get used to. Due to the UI, even though it was used every day, the administration was complicated.
- Compatibility with mobile devices.
For how long have I used the solution?
The solution was implemented 7 years ago.
What do I think about the stability of the solution?
The tool is very solid. The stability is impressive. To this day, it does not present any problems. You can trust it.
What do I think about the scalability of the solution?
The tool's scalability is very good - so much so that we have not had any problems since it was acquired.
How are customer service and support?
The experience has not been very good. We always have problems since they do not schedule a session in advance, they do not meet the SLA for responses or omissions, and the support hours are limited for Latin America.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
In the last two years, we changed the tool to a more modern one yet kept it to the Check Point family. The change was made since technology has to be constantly evolving.
How was the initial setup?
The installation and configuration of the tool were very simple. It has a very interactive wizard that guides you in the configuration part, which is a bit complex (since we did not have much experience).
What about the implementation team?
The implementation was done with the help of an engineer from the provider. He helped us with the configuration and explained various details. The engineer's experience was good.
What was our ROI?
It is always good to make an investment in security since the investment will be profitable in the future.
What's my experience with pricing, setup cost, and licensing?
The cost is accessible, however, not for many. It is an excellent tool. Other companies may not have the best solution on the market. The installation is easy as it is very interactive.
Which other solutions did I evaluate?
We evaluated different options in the market to have the best security solution. We ended up choosing Check Point, however, some brands we also looked at were Sophos, Fortinet, Ubiquiti EdgeRouter, OPNSense, and Cisco.
What other advice do I have?
It is a great solution with very good features and provides excellent security.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
*Disclosure: I am a real user, and this review is based on my own experience and opinions.