We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and Microsoft BitLocker based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."This encryption is relatively fast and really covers the needs required."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It's easily scalable and adaptable to the needs of the business."
"It has addressed storage and data transfer demands efficiently."
"It keeps the devices well monitored."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"This software has helped individuals in the organization avoid data loss."
"The initial setup is easy."
"If somebody has been compromised, the question always is: How has it affected other devices in the network? Cisco AMP gives you a very neat view of that."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"Secure Endpoint has decreased our time to remediate by providing the tools and the integrations we need so we can quickly look across our entire network, look for those threats, and actually make good decisions."
"The product's initial setup phase was very simple."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"appreciate the File Trajectory feature, as it's excellent for an analyst or mobile analyst. I can track everything that happens on our server from my PC or device. Integration with SecureX is a welcome feature because it connects Cisco's integrated security portfolio with our complete infrastructure. Sandboxing is helpful, and integration with the Cisco environment is excellent as we use many of their products, and that's very valuable for us."
"The most valuable feature is the authentication process which is very fast."
"It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked."
"Microsoft BitLocker can be used to ensure that stolen PCs or laptops do not lose their data."
"Whole Disk Encryption is great. BitLocker runs seamlessly during boot up."
"The ease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable."
"The tool is stable."
"It's a straightforward solution for encryption."
"There's a lot of manageability within the solution. This is very helpful."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"They should improve the interface and make it a little more user-friendly."
"The tool should be able to recover data from a stolen device."
"I would like to bring centralized management to mobile devices."
"In the future, I would like to see is the ability to decrypt equipment."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"Regarding the general topic of support, many have annoyances with it."
"The price is high for small scale business enterprises."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need."
"It cannot currently block URLs over websites."
"The Linux agent is a simple offline classic agent, and it doesn't support Secure Boot, which is important to have on a Linux machine. The Linux agent has conflicts with other solutions, including the Exploit Prevention system found in Windows servers. We didn't find a fix during troubleshooting, and Cisco couldn't offer one either. Eventually, we had to shut down the Exploit Prevention system. We didn't like that as we always want a solution that can fit smoothly into the setup without causing problems, especially where security is concerned. The tool also caused CPU spikes on our production machine, and we were seriously considering moving to another product."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"I would like to see integration with Cisco Analytics."
"Integration and dashboard are areas with certain shortcomings in Cisco Secure Endpoint."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"We recently found some stability issues with Microsoft BitLocker."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"I would like to see improvement in the solution's central management of passwords. Currently, we install it separately."
"I would like to be able to encrypt our cloud tenancy."
"I often have to make multiple attempts to log in."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"They can improve the security of the application and include an encryption disk in the next feature."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →