Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained.
We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information.
Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements.
This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.
Check Point Full Disk Encryption Software Blade gave us the opportunity to manage encryption on laptops that were carried out of the office, giving us the security of drive encryption and implementation through the management portal.
This encryption is quite fast and really covers the required needs.
The encryption algorithms are quite secure such as AES 256 in addition to the alerts that can be implemented to have the entire environment with a greater degree of control and administration.
For the company, the great characteristic of this tool is its centralized environment which offers the management of the tool from Check Point Security Management.
On the other hand, the implementation of self-management policies on devices is quite easy to implement, generating speed.
The algorithms implemented by Check Point Full Disk Encryption Software Blade are very secure, and this generates a lot of confidence in the tool.
Finally, this tool can be implemented in an existing Check Point gateway environment to keep everything in one place.
Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered.
As for the dashboard, I think it could be renewed to be more attractive to users.
As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.
We used this tool for several years now with pretty good results.
Previously we used Windows Disk Encryption Management, however, it was not to our liking or as robust as we wanted.
My advice is to always validate the scope of the solutions in addition to the costs to see if the tool is required.
We always evaluate options to determine which is the best. This option provided by Check Point seems to be what we required.