However, this blade is very good both on paper and in the testing.
The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company.
We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers.
It can be implemented easily with Harmony Endpoint.
Check Point Full Disk Encryption Software Blade helped us to have a solid solution with centralized management and control through its endpoint management.
It's ideal as an operating agent at the endpoint. We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.
Additionally, its remote management allows us to determine what to protect or what not is quite good. It is easy to execute and helped us a lot with the management in the company.
One of the most interesting functions that Check Point Full Disk Encryption Software Blade is that it can make it easy for massive implementation through the centralized administration portal where we can remotely take control of the protected units as well as offline.
This feature, in addition to encrypting, provides protection to prevent. If a device is lost, the information it contains cannot be deciphered. In our company, this functionality was promoted by the Check Point vendor according to our needs and the capabilities it provides.
It's an easy implementation with plenty of guide information.
The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow.
Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work.
Although they are excellent, they should improve their small problems to try to improve.
We've used this software for some time to centralize our Check Point security devices. This blade is very effective through the centralized portal.
Previously, we used the Microsoft tool. However, we already use Check Point as security tools.
Generally, the costs of Check Point tools are not public, which is why you need a good partner who can provide you with the help that one requires as a client.
We chose this product thanks to our partner - who had the right knowledge to help us make the decision to acquire this tool.
Other options were looked at, however, we like the manufacturer and its characteristics match what we need.