No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Full Disk Encryption Software Blade vs ESET Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Ranking in Endpoint Encryption
6th
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Mobile Data Protection (3rd)
ESET Endpoint Encryption
Ranking in Endpoint Encryption
3rd
Average Rating
8.4
Reviews Sentiment
5.1
Number of Reviews
17
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Endpoint Encryption category, the mindshare of Check Point Full Disk Encryption Software Blade is 4.3%, up from 2.1% compared to the previous year. The mindshare of ESET Endpoint Encryption is 6.6%, down from 19.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
ESET Endpoint Encryption6.6%
Check Point Full Disk Encryption Software Blade4.3%
Other89.1%
Endpoint Encryption
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
AravindR - PeerSpot reviewer
Technical Team Lead at Exalogic Consulting
Centralized encryption has secured all endpoints and has maintained compliance for remote devices
The best features of ESET Endpoint Encryption include full disk encryption, which is the most used one, ensuring all the endpoints are protected. I rely on this daily. Its main key focus on centralized management lets me monitor, enforce policies, and remediate issues from one console, and it allows for user-friendly deployment. Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency. From a security standpoint, I achieved 100% encryption coverage across all the endpoints, which significantly reduces the risk of data breaches due to lost or stolen devices. I also saw a noticeable drop in security incidents.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It keeps the devices well monitored."
"Above all, the possibility of keeping our data safe by placing a unique digital signature for each device we will encrypt, informing us of any unauthorized changes, is one of the most valuable features."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"It has addressed storage and data transfer demands efficiently."
"Check Point gives us the possibility of reaching each security goal we have and has been a strategic ally for our internal assurance and the security of our information within the organization."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"It is a cross-platform tool."
"The initial setup is easy."
"The tool does not slow down the computer."
"The solution allows me to easily monitor the encryption and password management of multiple computers in my network and gives me visibility into user use."
"The solution's UI is user-friendly. Even a non-technical person can use it."
"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"The scalability is good, it's perfect, I am satisfied."
"Using ESET Endpoint Encryption has had a clear positive impact on my organization, especially in terms of security operational efficiency."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"ESET Endpoint Encryption works as an antivirus system."
 

Cons

"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"The tool should be able to recover data from a stolen device."
"The cost of maintaining the system is high for personal use."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"I would like to bring centralized management to mobile devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"They should improve the interface and make it a little more user-friendly."
"From an admin perspective, the solution's UI could be more user-friendly."
"I would like more robust reporting as part of the Remote Administrator."
"ESET Endpoint Encryption needs to improve pricing and security."
"Sometimes the server console is very slow, so the performance could be improved."
"I would like to see better compatibility with mobile devices. Most of the time, people are connecting to our server using their mobile device."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"I would like to see better compatibility with mobile devices."
"For me, it is unstable."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"We paid for an annual subscription, and it was reasonable."
"ESET Endpoint Encryption is moderately priced."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"The pricing is mid-ranged and could be more cost-effective."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Comms Service Provider
12%
Computer Software Company
11%
University
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise6
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have something for data protection that I might not know about since I am not a profess...
What needs improvement with ESET Endpoint Encryption?
ESET Endpoint Encryption could be better as I have experience with Trend Micro encryption, but there are multiple getting challenges and policy defined challenges. However, ESET has a user-friendly...
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.