Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs ESET Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Ranking in Endpoint Encryption
7th
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
17
Ranking in other categories
Mobile Data Protection (5th)
ESET Endpoint Encryption
Ranking in Endpoint Encryption
3rd
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Endpoint Encryption category, the mindshare of Check Point Full Disk Encryption Software Blade is 2.4%, up from 1.2% compared to the previous year. The mindshare of ESET Endpoint Encryption is 18.5%, up from 15.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption
 

Featured Reviews

AshleyMorales - PeerSpot reviewer
Centralized management with full disk encryption and helpful authentification capabilities
They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are consumed; they should improve the audit area of the tool and make it more It is also efficient to add some type of remote access functionality for data recovery or integration with policy management tools. They must improve support and customer service, which is one of the factors where they have been failing the most in recent years.
Roman Danel - PeerSpot reviewer
Performs well, does not slow down the computer, and protects emails
The quality of protection is very important. The tool must also not slow down the computer. The quality of the user interface and the way the solution is updated must also be considered. The updates depend on certain situations. People who want to use the solution must check how it is working, check the memory, and the processes that are run. We must check if there are any unwanted features. For example, some antivirus tools install other services that are not necessary, and they are frequently updated. It won’t be a problem for a user who has a computer with more RAM, but it will be difficult to use it on an old computer with less RAM. The IT department uses remote features. Sometimes, they change some configurations remotely. Overall, I rate the tool a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It is a cross-platform tool."
"The solution provides complete security for one's workstation."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"This software has helped individuals in the organization avoid data loss."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"This encryption is relatively fast and really covers the needs required."
"The tool does not slow down the computer."
"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"ESET Endpoint Encryption works as an antivirus system."
"The initial setup is easy."
"The most valuable feature is that everything is done on the server."
"I have used it in the past because it works quite well for encryption."
"The setup is getting easier."
"The solution's UI is user-friendly. Even a non-technical person can use it."
 

Cons

"While the solution works as it should, it is overly expensive."
"Sometimes the performance rates are not consistent."
"The response time for technical support could be faster."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"They should improve the interface and make it a little more user-friendly."
"Regarding the general topic of support, many have annoyances with it."
"I would like to bring centralized management to mobile devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The initial setup could be made easier."
"Integration with central management needs improvement."
"There could be an option for users to restart the system without a password."
"From an admin perspective, the solution's UI could be more user-friendly."
"I would like to see better compatibility with mobile devices."
"The overall compatibility of the device is an area where the solution lacks."
"There should be more frequent updates."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"The pricing is mid-ranged and could be more cost-effective."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"Licensing costs are on a yearly basis."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"ESET Endpoint Encryption is moderately priced."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
16%
Computer Software Company
14%
Healthcare Company
8%
Government
8%
Computer Software Company
16%
Comms Service Provider
12%
Government
9%
Retailer
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem. My hands are kind of tied.
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.