Planning Analyst at Ovato
User
Top 5
Encrypts files well, blocks harmful content, and prevents data loss
Pros and Cons
  • "This software has helped individuals in the organization avoid data loss."
  • "The cost of maintaining the system is high for personal use."

What is our primary use case?

This tool provides full-featured security to our hard drives, and any other user files stored. 

Viruses can corrupt stored information and delete user data without the user's knowledge. The authentication marks prevent unauthorized users from accessing confidential information without user consent. 

We had to look for a platform like this after increased cases of data mismanagement from our staff members. 

Setting up personal passwords for accessing saved files is easy. The set encryption models prevent data loss from malware attacks.

How has it helped my organization?

This software has helped individuals in the organization avoid data loss. It secures private information from leaking to the public and unauthorized parties. 

It fully encrypts all the files stored in the hard drive to prevent any form of cyber attack. 

It blocks harmful content that can destroy stored files. 

Check Point Full Disk Encryption Software Blade allows the user to partition and label hard drives on various disks. 

Data protection has been the main goal, and this platform has fully helped us in working with safe products.

What is most valuable?

Automatic data encryption protects stored files from landing in the hands of unauthorized members. 

When we save our virtual meeting videos and other files there is a security guarantee, and no one can interfere with the confidential information. 

It helps back up files and keeps them safe until they are needed for reference. 

The virus protection models prevent the disk from transmitting viruses when sharing files among colleagues. 

Classifying folders and allocating space to various programs saves time when retrieving data.

What needs improvement?

I am familiar with set features, and the performance of this product is highly powerful. 

The cost of maintaining the system is high for personal use. 

Partitioning and setting up passwords is complicated for new users.

There is no low-volume storage package for small business enterprises. 

We have benefited from this product since we deployed it and have enjoyed its flexible features and high-performance capability. The variety of blades gives the users full data access control. 

I am impressed by the feature set's performance, and I totally recommend it to other companies.

Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

It is stable. It has offered the best services.

What do I think about the scalability of the solution?

Data encryption and hard disk protection services have impressed all the teams.

How are customer service and support?

The customer service team is always ready to act when we reach out.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have had no engagement with other vendors.

How was the initial setup?

The setup was complex due to limited knowledge of how to work this tool effectively.

What about the implementation team?

We did an in-house implementation.

What was our ROI?

There is a positive ROI due to effective data prevention of unauthorized attacks.

What's my experience with pricing, setup cost, and licensing?

The setup cost depends on the company's preferences.

Which other solutions did I evaluate?

We evaluated several products. However, this solution was more scalable. 

What other advice do I have?

The planned objectives have been achieved.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
A great feature of disk encryption, available in MGMT.
Pros and Cons
  • "We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
  • "Regarding the general topic of support, many have annoyances with it."

What is our primary use case?

 However, this blade is very good both on paper and in the testing.

The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company.

We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers.

It can be implemented easily with Harmony Endpoint.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade helped us to have a solid solution with centralized management and control through its endpoint management.

It's ideal as an operating agent at the endpoint. We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.

Additionally, its remote management allows us to determine what to protect or what not is quite good. It is easy to execute and helped us a lot with the management in the company.

What is most valuable?

One of the most interesting functions that Check Point Full Disk Encryption Software Blade is that it can make it easy for massive implementation through the centralized administration portal where we can remotely take control of the protected units as well as offline.

This feature, in addition to encrypting, provides protection to prevent. If a device is lost, the information it contains cannot be deciphered. In our company, this functionality was promoted by the Check Point vendor according to our needs and the capabilities it provides.

It's an easy implementation with plenty of guide information.

What needs improvement?

The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow.

Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work.

Although they are excellent, they should improve their small problems to try to improve.

For how long have I used the solution?

We've used this software for some time to centralize our Check Point security devices. This blade is very effective through the centralized portal.

Which solution did I use previously and why did I switch?

Previously, we used the Microsoft tool. However, we already use Check Point as security tools.

What's my experience with pricing, setup cost, and licensing?

Generally, the costs of Check Point tools are not public, which is why you need a good partner who can provide you with the help that one requires as a client.

Which other solutions did I evaluate?

 We chose this product thanks to our partner - who had the right knowledge to help us make the decision to acquire this tool.

Other options were looked at, however, we like the manufacturer and its characteristics match what we need.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Full Disk Encryption - Excellent centralized environment
Pros and Cons
  • "This encryption is relatively fast and really covers the needs required."
  • "The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."

What is our primary use case?

Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained.

We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information.

Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements.

This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade gave us the opportunity to manage encryption on laptops that were carried out of the office, giving us the security of drive encryption and implementation through the management portal.

This encryption is quite fast and really covers the required needs.

The encryption algorithms are quite secure such as AES 256 in addition to the alerts that can be implemented to have the entire environment with a greater degree of control and administration.

What is most valuable?

For the company, the great characteristic of this tool is its centralized environment which offers the management of the tool from Check Point Security Management.

On the other hand, the implementation of self-management policies on devices is quite easy to implement, generating speed.

The algorithms implemented by Check Point Full Disk Encryption Software Blade are very secure, and this generates a lot of confidence in the tool.

Finally, this tool can be implemented in an existing Check Point gateway environment to keep everything in one place.

What needs improvement?

Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered.

As for the dashboard, I think it could be renewed to be more attractive to users.

As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.

For how long have I used the solution?

We used this tool for several years now with pretty good results.

Which solution did I use previously and why did I switch?

Previously we used Windows Disk Encryption Management, however, it was not to our liking or as robust as we wanted.

What's my experience with pricing, setup cost, and licensing?

My advice is to always validate the scope of the solutions in addition to the costs to see if the tool is required.

Which other solutions did I evaluate?

We always evaluate options to determine which is the best. This option provided by Check Point seems to be what we required.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good endpoint security that prevents data leaks but needs better documentation
Pros and Cons
  • "End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
  • "The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."

What is our primary use case?

The tool provides security to the information found on user endpoint devices to prevent information from leaking outside the company. With this tool, we were able to do what was required to be able to provide this very important layer of security. 

How has it helped my organization?

It provides security for the information found on user endpoint devices to prevent information from leaking outside the company. With this tool, we were able to provide a very important layer of security. 

We have encrypted the data hard drives of the equipment and have been able to do it remotely from the centralized console.

What is most valuable?

The best features of Full Disk Encryption include:

  • End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system.
  • Pre-boot authentication is used to ensure that only authorized users can access the device and its encrypted data. building trust among users who use the product efficiently.
  • Centralized management.
  • Safe recovery.

What needs improvement?

The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.

The solution is always a blade, yet it must be purchased separately so that it can be integrated into the solution.

The documentation is sometimes from older devices, which is not all the same when implementing. They should replace the documentation with the most modern.                           

For how long have I used the solution?

We used this tool for a while to be able to control the encryption of the disks and devices that will be in use in our business devices.

Which solution did I use previously and why did I switch?

We had previously used the Windows solution. However, its implementation was not centralized or remote.

Which other solutions did I evaluate?

It is always important to test this type of solution before implementing it in production, as well as to validate execution times to make the best decision for the company.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Software Engineer at CloudSense
User
Top 5
Great data encryption, efficient support, and customizable storage
Pros and Cons
  • "Encryption prevents data loss which can cost the organization a lot of resources."
  • "The price is high for small scale business enterprises."

What is our primary use case?

The entire organization's workloads are secure under this platform. Check Point Full Disk Encryption Software Blade secures the company information saved in hard drives. 

Data encryption enhances file safety and secures team collaboration. 

This platform automatically encrypts all information on the hard disks for effective safety. It blocks affected files that may contain viruses to stop spreading. Data saved is kept under classified folders for easy retrieval. The security blade has saved confidential information from leaking into unsafe environments.

How has it helped my organization?

File and document management has been excellent since we implemented this platform. 

This tool gas large customizable storage spaces that can control a large volume of data. Data security and cloud storage infrastructure have been working effectively from powerful security models. Running workflows in safe environments have improved employee experience and orchestrated our file storage norms. 

This product has digitized our storage services and eliminated manual storage programs. I am impressed by the current performance, and I recommend this tool to others.

What is most valuable?

The security features safeguard our files from ransomware attacks. 

This tool has enabled us to set file management policies that can be observed to enhance efficient data management. 

Encryption prevents data loss which can cost the organization a lot of resources. 

The pricing and licensing terms are flexible and easy to maintain. The customer support staff is dedicated to offering timely services and providing solutions to any request. 

It is easy to use the UI and interact with the data management dashboards.

What needs improvement?

I have experienced great improvement in the management of files and security. The capabilities of all the features have been reliable since we deployed this platform. The price is high for small-scale business enterprises. The vendor team should invest more resources in training customers for the effective use of this tool. There is a need for automated backup that is always on standby to ensure there is no loss of data when upgrading our hard drives. Most storage and security services that we have received have been effective.

For how long have I used the solution?

I've used the solution for seven months. 

What do I think about the stability of the solution?

Security and data storage services are excellent.

What do I think about the scalability of the solution?

I am impressed by the great performance of this tool.

How are customer service and support?

The customer support services are efficient.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used similar data storage.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is a positive ROI from the overall performance.

What's my experience with pricing, setup cost, and licensing?

The licensing terms are efficient.

Which other solutions did I evaluate?

I have not evaluated other options.

What other advice do I have?

For data storage and safety, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Real User
Superior Security, reliable, easy to use, and highly scalable
Pros and Cons
  • "They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
  • "The response time for technical support could be faster."

What is our primary use case?

We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints.

This solution is available as an enterprise bundle, which we use on all of our endpoints.

What is most valuable?

They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.

It has been proven to be completely effective with us. We haven't had anything related to threats pass through our system in the last five years.

It is easy to use. 

When a new version becomes available, it automatically updates. The update is seamless, regardless of the features you have, because some features will not apply to clinics depending on what we use. We don't have a pre-built screen.

Whether it is a laptop or a desktop, we can customize it so that it does not interfere with our operations.

We do not need to change our security because it is superior to that of the Department of Technology.

What needs improvement?

The response time for technical support could be faster.

For how long have I used the solution?

I have been working with Check Point Full Disk Encryption Software Blade for 10 years.

What do I think about the stability of the solution?

The stability of Check Point Full Disk Encryption Software Blade is very good.

What do I think about the scalability of the solution?

Check Point Full Disk Encryption Software Blade is highly scalable.

How are customer service and support?

The technical support is a little slow in responding, but they always come through.

How was the initial setup?

The initial setup only requires the use of a small executable. It works well.

What's my experience with pricing, setup cost, and licensing?

I definitely don't have any information regarding the price. I am not involved in the purchase, maintenance, or contract.

Which other solutions did I evaluate?

The company is considering FireEye. I am evaluating the pros and cons, as well as the differences and benefits of using that other endpoint solution.

I am trying to compare what we have with FireEye because that is supposed to be mandated by the state. FireEye does not have what we have in Check Point, and we are attempting to justify why we don't need to change our environment.

This is being considered because they want to provide reports for the state, which we can do by customizing the reports they request.

What other advice do I have?

We have not had any problems with this solution which includes devices that have been lost or stolen.

I would rate Check Point Full Disk Encryption Software Blade a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Security And Network Administrator at a comms service provider with 501-1,000 employees
Real User
Easy to set up and stable with good technical support
Pros and Cons
  • "The initial setup is easy."
  • "You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."

What is our primary use case?

The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.

What is most valuable?

The solution is pretty reliable.

The initial setup is easy.

The stability is very good.

Technical support is pretty good.

What needs improvement?

I cant speak to any aspects that are lacking. We don't feel there are any missing features. 

You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.

For how long have I used the solution?

We've been dealing with the solution for three or four years at this point. it's been a while now. 

We do use full encryption at this point. Right now, this is just encrypting the hard drives. If you put any type of foreign device in, you have the option to, if you want, utilize it, however, you have to make the choice of encrypting it.

What do I think about the stability of the solution?

The solution offers good stability. There are no bugs or glitches. It doesn't crash or freeze. the performance is reliable. 

What do I think about the scalability of the solution?

I don't really have too many thoughts on scalability. I used to work with it to a certain point, and that was just initially trying to get it implemented and set up. After that, we realized that it's a full-time endeavour. When you mess with the endpoint, you might actually mess with the workstations. I'm not on the help desk or a part of the service team. I'm the network person. I don't get into the day-to-day of pushing updates or making sure that certain Blades were implemented on end user devices and stuff like that.

I'm not sure of the exact number of people on the solution at this time.

How are customer service and technical support?

Technical support is really good. They are quite reliable and responsive. We've been satisfied with the level of support they have provided.

How was the initial setup?

My understanding is that the initial setup is pretty straightforward. It's not complex. however, I didn't personally implement it. It's not a complex process.

What's my experience with pricing, setup cost, and licensing?

I don't handle the pricing or anything like that. I don't actually get involved in the pricing or licensing aspects of the product.

What other advice do I have?

We're just customers and end-users. We don't have a business relationship with Check Point. 

We likely use the most recent version of the solution, however, I cannot speak to the exact version number.

I'd rate the solution at a ten out of ten. It's a pretty robust product and we're satisfied with its capabilities.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Manager Information Security at a outsourcing company with 51-200 employees
Real User
Effective hard disk protection and overall stable
Pros and Cons
  • "The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
  • "I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."

What is our primary use case?

We use Check Point Full Disk Encryption Software Blade to protect our mobile devices. We do not use a lot of the functionality of the solution, we only use FDE.

What is most valuable?

The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.

For how long have I used the solution?

I have been using Check Point Full Disk Encryption Software Blade for approximately more than eight years.

What do I think about the stability of the solution?

The overall stability of Check Point Full Disk Encryption Software Blade has been good. We have had some minor issues but we have not had an issue that needed major escalation.

What do I think about the scalability of the solution?

We have a small user base using Check Point Full Disk Encryption Software Blade.

How are customer service and support?

We have used the support. We have created support tickets. If needed I escalate the issue I have to our account manager.

I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.

How would you rate customer service and support?

Neutral

What other advice do I have?

We have not had any problems with the maintenance of the solution.

I rate Check Point Full Disk Encryption Software Blade an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros sharing their opinions.