Check Point Full Disk Encryption Software Blade vs McAfee Complete Data Protection comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and McAfee Complete Data Protection based on real PeerSpot user reviews.

Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
765,386 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has addressed storage and data transfer demands efficiently.""It's easily scalable and adaptable to the needs of the business.""The solution provides complete security for one's workstation.""It keeps the devices well monitored.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.""Encryption prevents data loss which can cost the organization a lot of resources.""The initial setup is easy.""It helps us maximize the operational efficiency and performance of our activities."

More Check Point Full Disk Encryption Software Blade Pros →

"We can scale the solution.""It is part of the DLP and works well for that use case.""Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device.""It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution.""All of the Complete Data products are valuable.""The beauty of McAfee is that they are not looking at encryption from one single standpoint. It is a broader solution.""The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.""With this solution, the device control is more reliable and more stable."

More McAfee Complete Data Protection Pros →

Cons
"The tool should be able to recover data from a stolen device.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.""I would like to bring centralized management to mobile devices.""You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.""The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered.""They should improve the interface and make it a little more user-friendly.""The price is high for small scale business enterprises."

More Check Point Full Disk Encryption Software Blade Cons →

"The solution needs to reduce the number of false positives. There are too many of them.""The drive side encryption can be confusing to use and needs better documentation.""As a new technology, it does need to grow.""We encountered several problems with the solution's stability.""There was an option for SQL setup in the older versions of this product and it has been removed, but we would like to see it made available as an add-on.""Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice.""The solution needs a next generation or AI firewall that doesn't rely on signatures to detect traits.""The price is a little high and could be better."

More McAfee Complete Data Protection Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "The price of this solution needs to be improved."
  • "The price is good, it's a low-cost solution."
  • "This solution is reasonably priced."
  • "The pricing is better than that of some competing products."
  • "The pricing of the cloud offering seems confusing."
  • "I think the price could be a little bit less."
  • "McAfee Complete Data Protection is a little bit expensive."
  • "We currently have a contract option with McAfee Complete Data Protection."
  • More McAfee Complete Data Protection Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    765,386 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection… more »
    Top Answer:It provides encryption, data protection, and DLP, all under one roof The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The… more »
    Top Answer:When it comes to pricing, I've observed an increase recently.
    Ranking
    3rd
    out of 28 in Endpoint Encryption
    Views
    657
    Comparisons
    334
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    2nd
    out of 28 in Endpoint Encryption
    Views
    3,089
    Comparisons
    2,287
    Reviews
    10
    Average Words per Review
    518
    Rating
    8.0
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Xcel Energy
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm23%
    Computer Software Company23%
    Financial Services Firm15%
    Insurance Company5%
    REVIEWERS
    Computer Software Company21%
    Energy/Utilities Company14%
    Government14%
    Security Firm14%
    VISITORS READING REVIEWS
    Financial Services Firm14%
    Computer Software Company13%
    Government12%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business37%
    Midsize Enterprise11%
    Large Enterprise51%
    REVIEWERS
    Small Business53%
    Midsize Enterprise20%
    Large Enterprise27%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise15%
    Large Enterprise69%
    Buyer's Guide
    Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection
    March 2024
    Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection and other solutions. Updated: March 2024.
    765,386 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while McAfee Complete Data Protection is ranked 2nd in Endpoint Encryption with 30 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while McAfee Complete Data Protection is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Good encryption with a helpful central management console and excellent reliability". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker and Cisco Secure Endpoint, whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint, Sophos SafeGuard and Trend Micro Endpoint Encryption. See our Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection report.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.