We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and Sophos SafeGuard based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."It's easily scalable and adaptable to the needs of the business."
"This software has helped individuals in the organization avoid data loss."
"It keeps the devices well monitored."
"It has addressed storage and data transfer demands efficiently."
"Encryption prevents data loss which can cost the organization a lot of resources."
"The solution provides complete security for one's workstation."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"There are no issues or drops in the solution's performance...The solution's technical support was helpful."
"The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great."
"Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."
"Its most valuable features are its scalability and advanced threat protection for customers."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"Another of my favorite features is called the Device Trajectory, where it shows everything that's going on, on a computer. It shows the point in time when a virus is downloaded, so you can see if the user was surfing the internet or had a program open. It shows every running process and file access on the computer and saves it like a snapshot when it detects something malicious. It also has a File Trajectory, so you can even see if that file has been found on any of your other computers that have AMP."
"It's a straightforward solution."
"It's the best solution on the market."
"The features that I have found most valuable are encryption tools that encrypt the hard disk and the USB sticks."
"It's quite easy to integrate Safeguard with BitLocker"
"The most valuable feature of the solution stems from the fact that the GUI is easy to use."
"Security-wise, it's one of the best."
"The solution has done a fabulous job of protecting us from threats."
"The advantage of Sophos SafeGuard stems from the fact that it is more secure than other products in the market."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"While the solution works as it should, it is overly expensive."
"The cost of maintaining the system is high for personal use."
"The tool should be able to recover data from a stolen device."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"They should improve the interface and make it a little more user-friendly."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"Logging could be better in terms of sending more logs to Cisco Firepower or Cisco ASA. That's an area where it could be made better."
"The solution needs more in-depth analytics."
"In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something."
"On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step."
"The room for improvement would be on event notifications. I have mine tuned fairly well. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information. Sometimes, when you're overwhelmed with information, you just say, "I'm not going to look at anything because I'm receiving so much." I recommend the vendor come up with a white paper on the best practices for event notifications."
"In Orbital, there are tons of prebuilt queries, but there is not a lot of information in lay terms. There isn't enough information to help us with what we're looking for and why we are looking for it with this query. There are probably a dozen queries in there that really focus on what I need to focus on, but they are not always easy to find the first time through."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"In the next version of this solution, I would like to see the addition of local authentication."
"If it's possible, they should make all the features available because it's got a lot of features on offer, but you have to buy the license in order to add those features to the normal Endpoint. If they could make all those features available and/or offer a bundling option it would be better."
"SafeGuard's user interface is ugly and doesn't provide reports, so we have to go into the database and get information from there by creating queries."
"The dashboards lack sufficient information."
"When you have the PPM chipset, you can have the power-on authentication, when you boot up your machine, you can set the six-digit passcode. As of right now, SafeGuard can't manage the six-digit passcode in terms of the expiration, and I need that added as a feature."
"As a tool, Sophos SafeGuard is not optimized."
"The product's next release could have integration features with different internal and external systems."
"It would be ideal if the solution had different features within one agent."
"Technical support could be a bit better."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →