Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs ESET Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Ranking in Endpoint Encryption
7th
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Mobile Data Protection (4th)
ESET Endpoint Encryption
Ranking in Endpoint Encryption
4th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Endpoint Encryption category, the mindshare of Check Point Full Disk Encryption Software Blade is 3.4%, up from 1.5% compared to the previous year. The mindshare of ESET Endpoint Encryption is 11.7%, down from 18.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
ESET Endpoint Encryption11.7%
Check Point Full Disk Encryption Software Blade3.4%
Other84.9%
Endpoint Encryption
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
reviewer2674917 - PeerSpot reviewer
Manager, Information Technology at a healthcare company with 201-500 employees
encryption works well but needs a fix for compatibility with the latest Windows version
I have used it in the past because it works quite well for encryption. It's better than trying to just use BitLocker, which is a pain from a management standpoint. It works up to this point. My issue is that I need to roll it out on new machines, and I can't get the application to work correctly. It's encrypted at rest, so I can't use the data if I'm not logged in correctly into the laptop with the correct user credentials.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The initial setup is easy."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It keeps the devices well monitored."
"It's easily scalable and adaptable to the needs of the business."
"It is a cross-platform tool."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"This software has helped individuals in the organization avoid data loss."
"I have used it in the past because it works quite well for encryption."
"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"The most valuable feature is that everything is done on the server."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The product is easy to implement and configure."
"The initial setup is easy."
"ESET Endpoint Encryption works as an antivirus system."
"The usability is the most valuable feature."
 

Cons

"They could improve the latency in the platform when entering the portal."
"The tool should be able to recover data from a stolen device."
"In the future, I would like to see is the ability to decrypt equipment."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"While the solution works as it should, it is overly expensive."
"The response time for technical support could be faster."
"The price is high for small scale business enterprises."
"The initial setup could be made easier."
"Integration with central management needs improvement."
"There should be more frequent updates."
"From an admin perspective, the solution's UI could be more user-friendly."
"If you have issues with your network, you can't get updates, which is a problem."
"The overall compatibility of the device is an area where the solution lacks."
"I would like more robust reporting as part of the Remote Administrator."
"ESET Endpoint Encryption needs to improve pricing and security."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"The pricing is mid-ranged and could be more cost-effective."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"ESET Endpoint Encryption is moderately priced."
"Licensing costs are on a yearly basis."
"It is neither very expensive, nor cheap. Overall it is affordable and there is a long term arrangement between our company and the solution providers for license."
"We paid for an annual subscription, and it was reasonable."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
14%
Comms Service Provider
13%
University
8%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise5
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have something for data protection that I might not know about since I am not a profess...
What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem. My hands are kind of tied.
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.