Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs Lookout comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (7th), Mobile Data Protection (3rd)
Lookout
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
3
Ranking in other categories
Threat Intelligence Platforms (TIP) (31st), Endpoint Detection and Response (EDR) (56th), Mobile Threat Defense (3rd)
 

Mindshare comparison

Check Point Full Disk Encryption Software Blade and Lookout aren’t in the same category and serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 2.7%, up 1.4% compared to last year.
Lookout, on the other hand, focuses on Mobile Threat Defense, holds 25.4% mindshare, down 27.4% since last year.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Check Point Full Disk Encryption Software Blade2.7%
Microsoft BitLocker34.6%
ESET Endpoint Encryption16.5%
Other46.199999999999996%
Endpoint Encryption
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
Lookout25.4%
Zimperium29.7%
Check Point Harmony Mobile12.3%
Other32.60000000000001%
Mobile Threat Defense
 

Featured Reviews

AshleyMorales - PeerSpot reviewer
Centralized management with full disk encryption and helpful authentification capabilities
They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are consumed; they should improve the audit area of the tool and make it more It is also efficient to add some type of remote access functionality for data recovery or integration with policy management tools. They must improve support and customer service, which is one of the factors where they have been failing the most in recent years.
DB
Enhanced mobile security with visibility into app and website usage, but installation challenges remain
We use Lookout for mobile devices, such as phones It has reduced our risk around mobile devices. I like the security features and being able to see what apps and websites people are using. There is nothing we have come across that we've desired. We have been using Lookout for one year. The…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's easily scalable and adaptable to the needs of the business."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It has addressed storage and data transfer demands efficiently."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"Encryption prevents data loss which can cost the organization a lot of resources."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"We have not had any issues with bugs or breakdowns."
 

Cons

"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"While the solution works as it should, it is overly expensive."
"The tool should be able to recover data from a stolen device."
"Sometimes the performance rates are not consistent."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The price is high for small scale business enterprises."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The initial setup requires a little bit of experience with configuration."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
"Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
869,095 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
18%
Manufacturing Company
10%
Financial Services Firm
10%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business13
Midsize Enterprise2
Large Enterprise9
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your experience regarding pricing and costs for Lookout?
The pricing is a little expensive. We are currently looking at comparisons with other solutions, including Umbrella.
What needs improvement with Lookout?
There is nothing we have come across that we've desired.
 

Also Known As

No data available
CipherCloud
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Information Not Available
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. Lookout and other solutions. Updated: July 2025.
869,095 professionals have used our research since 2012.