We performed a comparison between Check Point Full Disk Encryption Software Blade and ESET Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"The solution provides complete security for one's workstation."
"It is a cross-platform tool."
"It keeps the devices well monitored."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"It helps us maximize the operational efficiency and performance of our activities."
"Encryption prevents data loss which can cost the organization a lot of resources."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The setup is getting easier."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The initial setup is easy."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"This solution can be centrally managed."
"The usability is the most valuable feature."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"In the future, I would like to see is the ability to decrypt equipment."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The response time for technical support could be faster."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The tool should be able to recover data from a stolen device."
"They should improve the interface and make it a little more user-friendly."
"They could improve the latency in the platform when entering the portal."
"The cost of maintaining the system is high for personal use."
"From an admin perspective, the solution's UI could be more user-friendly."
"If you have issues with your network, you can't get updates, which is a problem."
"Sometimes the server console is very slow, so the performance could be improved."
"There should be more frequent updates."
"I would like more robust reporting as part of the Remote Administrator."
"The initial setup could be made easier."
"The overall compatibility of the device is an area where the solution lacks."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while ESET Endpoint Encryption is ranked 5th in Endpoint Encryption with 12 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while ESET Endpoint Encryption is rated 8.4. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Good encryption with a helpful central management console and excellent reliability". On the other hand, the top reviewer of ESET Endpoint Encryption writes "A reasonably priced solution that is an easy-to-use and effective at the same time". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas ESET Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, Symantec Endpoint Encryption and WinMagic SecureDoc. See our Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.