Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs McAfee MVISION Mobile comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Endpoint Encryption (7th), Mobile Data Protection (4th)
McAfee MVISION Mobile
Average Rating
9.0
Reviews Sentiment
8.0
Number of Reviews
1
Ranking in other categories
Mobile Threat Defense (8th)
 

Mindshare comparison

Check Point Full Disk Encryption Software Blade and McAfee MVISION Mobile aren’t in the same category and serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 3.4%, up 1.5% compared to last year.
McAfee MVISION Mobile, on the other hand, focuses on Mobile Threat Defense, holds 4.4% mindshare, up 4.4% since last year.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Check Point Full Disk Encryption Software Blade3.4%
Microsoft BitLocker23.6%
ESET Endpoint Encryption11.7%
Other61.3%
Endpoint Encryption
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
McAfee MVISION Mobile4.4%
Zimperium26.6%
Lookout20.7%
Other48.3%
Mobile Threat Defense
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
reviewer1066482 - PeerSpot reviewer
Managing Director at a consultancy with 1-10 employees
A market leader that integrates nicely with other McAfee security products and is quite stable
We are just customers and end-users. We are using the most up-to-date version available at this time. I'd advise potential new users that the key thing is to clearly understand what your requirements are and what your use cases are, and both your business requirements, your technical requirements, and your regulatory requirements. It's important to understand all of those. A company needs to clearly understand all the use cases it needs to manage and make sure they do the appropriate due diligence to find a product that can achieve all those requirements and handle all those use cases. It was an extensive process for us. We did about four to six months of paper-based due diligence - not even a field trial - to make that we were picking the right product. We leveraged a lot of outside vendor-neutral sources like Gartner. So far, I'd rate the solution at a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has addressed storage and data transfer demands efficiently."
"Encryption prevents data loss which can cost the organization a lot of resources."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The product's initial setup phase is totally fine."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"It helps us maximize the operational efficiency and performance of our activities."
"It's easily scalable and adaptable to the needs of the business."
"The product is one of the market leaders, according to Gartner, on mobile protection."
 

Cons

"I would like to bring centralized management to mobile devices."
"Sometimes the performance rates are not consistent."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"Regarding the general topic of support, many have annoyances with it."
"The tool should be able to recover data from a stolen device."
"In the future, I would like to see is the ability to decrypt equipment."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The one thing that I know that they're working on, that's not quite there in the product, is the artificial intelligence aspect."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
Information not available
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
881,078 professionals have used our research since 2012.
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
No data available
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have something for data protection that I might not know about since I am not a profess...
Ask a question
Earn 20 points
 

Also Known As

No data available
McAfee MDP, MVISION Mobile
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
LeadQual
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: January 2026.
881,078 professionals have used our research since 2012.