We performed a comparison between Check Point Full Disk Encryption Software Blade, McAfee Complete Data Protection, and Microsoft BitLocker based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."Encryption prevents data loss which can cost the organization a lot of resources."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"It is a cross-platform tool."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"This software has helped individuals in the organization avoid data loss."
"It helps us maximize the operational efficiency and performance of our activities."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"I am satisfied with the customer service/technical support."
"The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud."
"McAfee Complete Data Protection provides stability and is a good product."
"The new feature for online protection does a good job of identifying traits."
"The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints."
"The interface is user-friendly and it provides a large number of options."
"I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job."
"I have found the USB part most valuable."
"The solution works the way it's supposed to - stability and scalability are fine."
"Whole Disk Encryption is great. BitLocker runs seamlessly during boot up."
"It is easy to implement and has AD integration."
"I like BitLocker because it gives us strong encryption to protect our data."
"You can do a silent remote deployment very fast."
"The most valuable feature of this solution is the protection and ease of use."
"Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"The tool should be able to recover data from a stolen device."
"The price is high for small scale business enterprises."
"They should improve the interface and make it a little more user-friendly."
"In the future, I would like to see is the ability to decrypt equipment."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The cost of maintaining the system is high for personal use."
"They could improve the latency in the platform when entering the portal."
"While the solution works as it should, it is overly expensive."
"There are some features that do not work with Mac."
"We encountered several problems with the solution's stability."
"I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too."
"They need to segregate McAfee Complete Data Protection for endpoints and servers."
"The product must improve endpoint encryption."
"The drive side encryption can be confusing to use and needs better documentation."
"In terms of where the solution could improve, it could integrate with network solutions for ADTs, email web gateways and discovery."
"It is difficult to manage."
"The migration itself is a nightmare."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"The people at the first level of support refer you to articles that do not pertain to the problem at hand."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"I would like to be able to encrypt our cloud tenancy."
"They could improve cloud integration regarding attribute and encryption key management."
"Lacks a portal that can be managed rather than just existing."
"The deployment process regarding prerequisites and automation could be easy to understand."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
More McAfee Complete Data Protection Pricing and Cost Advice →