Coming October 25: PeerSpot Awards will be announced! Learn more
Buyer's Guide
Endpoint Encryption
October 2022
Get our free report covering Microsoft, Cisco, McAfee, and other competitors of Check Point Full Disk Encryption Software Blade. Updated: October 2022.
635,987 professionals have used our research since 2012.

Read reviews of Check Point Full Disk Encryption Software Blade alternatives and competitors

alvarado - PeerSpot reviewer
Cloud Support Leader at a tech company with 51-200 employees
User
Top 5Leaderboard
Protective with good encryption and reporting
Pros and Cons
  • "Alerts are sent to email and can be configured to notify findings and vulnerabilities in the information, and events, among others. This monitoring is really very good for the company since decisions can be made to adjust the policies."
  • "It is important to improve the way they provide support."

What is our primary use case?

The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of any type of data medium, DVS, hard drive, and USB, among others. It's an important feature to prevent the theft of user information. It provides security for the company's data in addition to the other security services we have.

We love the encryption it automatically provides and its work agent uses almost no computer resources, an excellent hardware protection tool.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade has improved our organization in the way that all data is protected as it is one of the most important assets for us. The loss of data would involve the loss of sensitive information. Therefore, in the IT and security department we are looking for a tool that could be quite versatile to protect this data, in the past a laptop and the information on it were lost, and in the face of this, we seek to improve and protect this information.

At a managerial level, this tool provides a lot of security.

What is most valuable?

Check Point Full Disk Encryption Software Blade has Registration and Alerts. They are very good features for administrators since team activities can be stored, allowing us to validate audits and centralize reports in order to ensure that everyone is in compliance with configured rules. Alerts are sent to email and can be configured to notify findings and vulnerabilities in the information, and events, among others. This monitoring is really very good for the company since decisions can be made to adjust the policies.

What needs improvement?

They could improve a bit on the encryption time of the units. They take a little time to recover. On the other hand, encryption also takes a little extra when it is completed for the first time. These are some details that can affect the performance of the technology implemented through the blade.

It is important to improve the way they provide support. It is not bad, however, sometimes it takes a long time to coordinate sessions.

For how long have I used the solution?

The Check Point Full Disk Encryption Software Blade provides automatic security for all information, which is an ideal feature for staff who travel or go to clients with their equipment, this helps to protect the information if it is lost or stolen. We used this blade for more than half a year and everything has gone very well.

Which solution did I use previously and why did I switch?

We used the Microsoft tool, however, we wanted to try other alternatives, so we switched to Check Point to test it.

Which other solutions did I evaluate?

We validate various documentation from other manufacturers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Cloud Support - Security Admin at a tech company with 1-10 employees
User
Top 5Leaderboard
Good centralized management and control with excellent performance
Pros and Cons
  • "We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
  • "Regarding the general topic of support, many have annoyances with it."

What is our primary use case?

We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers. However, this blade is very good both on paper and in the testing.

The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company.

It can be implemented easily with Harmony Endpoint.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade helped us to have a solid solution with centralized management and control through its endpoint management.

It's ideal as an operating agent at the endpoint. We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.

Additionally, its remote management allows us to determine what to protect or what not is quite good. It is easy to execute and helped us a lot with the management in the company.

What is most valuable?

One of the most interesting functions that Check Point Full Disk Encryption Software Blade is that it can make it easy for massive implementation through the centralized administration portal where we can remotely take control of the protected units as well as offline.

This feature, in addition to encrypting, provides protection to prevent. If a device is lost, the information it contains cannot be deciphered. In our company, this functionality was promoted by the Check Point vendor according to our needs and the capabilities it provides.

It's an easy implementation with plenty of guide information.

What needs improvement?

The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow.

Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work.

Although they are excellent, they should improve their small problems to try to improve.

For how long have I used the solution?

We've used this software for some time to centralize our Check Point security devices. This blade is very effective through the centralized portal.

Which solution did I use previously and why did I switch?

Previously, we used the Microsoft tool. However, we already use Check Point as security tools.

What's my experience with pricing, setup cost, and licensing?

Generally, the costs of Check Point tools are not public, which is why you need a good partner who can provide you with the help that one requires as a client.

Which other solutions did I evaluate?

 We chose this product thanks to our partner - who had the right knowledge to help us make the decision to acquire this tool.

Other options were looked at, however, we like the manufacturer and its characteristics match what we need.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Buyer's Guide
Endpoint Encryption
October 2022
Get our free report covering Microsoft, Cisco, McAfee, and other competitors of Check Point Full Disk Encryption Software Blade. Updated: October 2022.
635,987 professionals have used our research since 2012.