We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and McAfee Complete Data Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"Encryption prevents data loss which can cost the organization a lot of resources."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The initial setup is easy."
"This encryption is relatively fast and really covers the needs required."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"It has addressed storage and data transfer demands efficiently."
"The product itself is pretty reliable. The security features that it has make it reliable."
"Its most valuable features are its scalability and advanced threat protection for customers."
"The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware."
"The most valuable features of this solution are the IPS and the integration with ISE."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction."
"I have found the USB part most valuable."
"All of the Complete Data products are valuable."
"It is capable of acting as Web control, Device Control, or Data Control."
"With respect to data loss prevention, I think it is helpful to the customer."
"Reporting and encryption are its most valuable features."
"It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution."
"The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud."
"Regarding the general topic of support, many have annoyances with it."
"They could improve the latency in the platform when entering the portal."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"While the solution works as it should, it is overly expensive."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The tool should be able to recover data from a stolen device."
"The response time for technical support could be faster."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"The solution needs more in-depth analytics."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"The pricing policy could be more competitive, similar to Cisco's offerings."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"It is not very stable because we have new versions four times a year, which fixes bugs. We had some problems with some deployments."
"This product has issues with the number of false positives that it reports."
"There are compatibility issues with the Chrome browser."
"In terms of where the solution could improve, it could integrate with network solutions for ADTs, email web gateways and discovery."
"As a new technology, it does need to grow."
"There's a limited coverage of operating systems. The marketing strategies need to change drastically."
"The product must improve endpoint encryption."
"They need to segregate McAfee Complete Data Protection for endpoints and servers."
"Though there may be some ransomware detection modules now in McAfee Complete Data Protection, it's a field that McAfee should focus on, particularly having integration with some EDR or other add-ons. This is so McAfee Complete Data Protection would have more accuracy in detecting new ransomware in the market. What I'd like to see in the next release of the solution is for its pricing to be more cost-effective because some competitors have cheaper pricing, so McAfee Complete Data Protection can't compete. Sometimes, some new vendors offer other solutions rather than McAfee Complete Data Protection, to win customers over, and this is a loss for McAfee."
"The drive side encryption can be confusing to use and needs better documentation."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
More McAfee Complete Data Protection Pricing and Cost Advice →