Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint vs Sophos SafeGuard comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and Sophos SafeGuard based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
769,334 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It's easily scalable and adaptable to the needs of the business.""This software has helped individuals in the organization avoid data loss.""It keeps the devices well monitored.""It has addressed storage and data transfer demands efficiently.""Encryption prevents data loss which can cost the organization a lot of resources.""The solution provides complete security for one's workstation.""The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."

More Check Point Full Disk Encryption Software Blade Pros →

"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted.""The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good.""There are no issues or drops in the solution's performance...The solution's technical support was helpful.""The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great.""Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations.""Its most valuable features are its scalability and advanced threat protection for customers.""It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities.""Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."

More Cisco Secure Endpoint Pros →

"It's a straightforward solution.""It's the best solution on the market.""The features that I have found most valuable are encryption tools that encrypt the hard disk and the USB sticks.""It's quite easy to integrate Safeguard with BitLocker""The most valuable feature of the solution stems from the fact that the GUI is easy to use.""Security-wise, it's one of the best.""The solution has done a fabulous job of protecting us from threats.""The advantage of Sophos SafeGuard stems from the fact that it is more secure than other products in the market."

More Sophos SafeGuard Pros →

Cons
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""While the solution works as it should, it is overly expensive.""The cost of maintaining the system is high for personal use.""The tool should be able to recover data from a stolen device.""There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.""I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.""They should improve the interface and make it a little more user-friendly.""The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."

More Check Point Full Disk Encryption Software Blade Cons →

"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better.""The solution needs more in-depth analytics.""In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something.""On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step.""The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications.""In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through.""Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that.""In the next version of this solution, I would like to see the addition of local authentication."

More Cisco Secure Endpoint Cons →

"If it's possible, they should make all the features available because it's got a lot of features on offer, but you have to buy the license in order to add those features to the normal Endpoint. If they could make all those features available and/or offer a bundling option it would be better.""SafeGuard's user interface is ugly and doesn't provide reports, so we have to go into the database and get information from there by creating queries.""The dashboards lack sufficient information.""When you have the PPM chipset, you can have the power-on authentication, when you boot up your machine, you can set the six-digit passcode. As of right now, SafeGuard can't manage the six-digit passcode in terms of the expiration, and I need that added as a feature.""As a tool, Sophos SafeGuard is not optimized.""The product's next release could have integration features with different internal and external systems.""It would be ideal if the solution had different features within one agent.""Technical support could be a bit better."

More Sophos SafeGuard Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
  • "The costs of 50 licenses of AMP for three years is around $9,360."
  • "The price is very good."
  • "The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
  • "Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
  • "In our case, it is a straightforward annual payment through our Enterprise Agreement."
  • "Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
  • "There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "The licensing costs depend on the series. For example, XG 85 can be around $200. If you go to ACC or to a four or five-year enterprise solution, you will find these devices can cost $10,000. It depends on the series."
  • "Licensing for this solution is on a yearly basis."
  • "The licenses are dependant on the number of users and computers you have to protect."
  • "We have a yearly license with Sophos which is around $1000-$1200 or so per annum. There are no additional costs beyond the standard licensing fee."
  • "Licensing is on a yearly basis and the pricing could be better."
  • "It would be great if the price of the solution was lower than the current price. If we are to sell this particular solution to smaller businesses and not just enterprise businesses it needs to be lower."
  • "We pay around $10 a year for each endpoint, including support."
  • "Pricing for Sophos SafeGuard could be improved because it could reach a thousand dollars depending on the product, edition, and software key purchased."
  • More Sophos SafeGuard Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    769,334 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in… more »
    Top Answer:The product provides sandboxing options like file reputation and file analysis.
    Top Answer:Pricing is a big issue. Some customers find the price reasonable. Some customers do not agree with the price.
    Top Answer:We must install an agent on every laptop. We do not know how to do it for the network. We shouldn’t have to install… more »
    Top Answer:It is one of the best products when it comes to stability.
    Top Answer:As a tool, Sophos SafeGuard is not optimized. I suggest that Sophos SafeGuard should be optimized so that it takes less… more »
    Ranking
    3rd
    out of 28 in Endpoint Encryption
    Views
    616
    Comparisons
    301
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    Views
    10,519
    Comparisons
    5,961
    Reviews
    20
    Average Words per Review
    935
    Rating
    8.3
    2nd
    out of 28 in Endpoint Encryption
    Views
    986
    Comparisons
    722
    Reviews
    10
    Average Words per Review
    468
    Rating
    8.7
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    SafeGuard, SafeGuard Encryption
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.

    Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Protect your confidential information and comply with regulatory mandates safely and securely with SafeGuard Enterprise, Utimaco's comprehensive modular information protection platform. SafeGuard Enterprise is a modular information protection control platform that enforces policy-based security for PCs and mobile devices across mixed environments. SafeGuard Enterprise offers full transparency to end-users and is easy to administer from a single central console.
    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Rushmoor Borough Council
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Solution Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company23%
    Financial Services Firm15%
    Insurance Company5%
    REVIEWERS
    Computer Software Company16%
    Financial Services Firm13%
    Manufacturing Company9%
    Comms Service Provider9%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Government9%
    Financial Services Firm8%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm22%
    Marketing Services Firm11%
    Computer Software Company11%
    Manufacturing Company11%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Government11%
    Comms Service Provider9%
    Financial Services Firm9%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise50%
    REVIEWERS
    Small Business35%
    Midsize Enterprise25%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business62%
    Midsize Enterprise21%
    Large Enterprise18%
    VISITORS READING REVIEWS
    Small Business34%
    Midsize Enterprise14%
    Large Enterprise52%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption. Updated: April 2024.
    769,334 professionals have used our research since 2012.