Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs McAfee MVISION Mobile vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Check Point Full Disk Encryption Software Blade3.4%
Microsoft BitLocker23.6%
ESET Endpoint Encryption11.7%
Other61.3%
Endpoint Encryption
Mobile Threat Defense Market Share Distribution
ProductMarket Share (%)
McAfee MVISION Mobile4.4%
Zimperium26.6%
Lookout20.7%
Other48.3%
Mobile Threat Defense
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Microsoft BitLocker23.6%
ESET Endpoint Encryption11.7%
Symantec Endpoint Encryption8.5%
Other56.2%
Endpoint Encryption
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
reviewer1066482 - PeerSpot reviewer
Managing Director at a consultancy with 1-10 employees
A market leader that integrates nicely with other McAfee security products and is quite stable
We are just customers and end-users. We are using the most up-to-date version available at this time. I'd advise potential new users that the key thing is to clearly understand what your requirements are and what your use cases are, and both your business requirements, your technical requirements, and your regulatory requirements. It's important to understand all of those. A company needs to clearly understand all the use cases it needs to manage and make sure they do the appropriate due diligence to find a product that can achieve all those requirements and handle all those use cases. It was an extensive process for us. We did about four to six months of paper-based due diligence - not even a field trial - to make that we were picking the right product. We leveraged a lot of outside vendor-neutral sources like Gartner. So far, I'd rate the solution at a nine out of ten.
Ibrahin Gamal - PeerSpot reviewer
Senior Technology Specialist at ITE Corp
Data protection improves while users adapt to user access complexities
Recovery options are useful with Microsoft BitLocker. When we get the recovery key from Microsoft, people who we show how BitLocker works did not know the facts about BitLocker. When we tell them about recovery keys, it is very difficult for them to get to the users who have issues in their PCs and do not have the knowledge. When IT asked about the scenario, it was difficult for them. They needed something where they could go to the administration portal to unlock the PC for the user, but we tell them that when a user asks for a recovery key, it consists of 32 numbers to unlock their PC. They observed cost savings after implementing Microsoft BitLocker because they requested BitLocker with System Center. They found that it did not have a high cost, as it is a built-in feature in Windows. When they asked about other solutions, it was very expensive for large numbers in other corporates or organizations. They were very satisfied with Microsoft BitLocker with System Center Configuration Manager.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It keeps the devices well monitored."
"It helps us maximize the operational efficiency and performance of our activities."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"This software has helped individuals in the organization avoid data loss."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The initial setup is easy."
"The product's initial setup phase is totally fine."
"The product is one of the market leaders, according to Gartner, on mobile protection."
"The solution has a feature that automatically asks the users to upgrade their password once we set up the process."
"It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us."
"The solution works the way it's supposed to - stability and scalability are fine."
"We use Microsoft BitLocker for our endpoints, including laptops."
"One significant aspect is that without the BitLocker key, you can't log in to the user's laptop. I appreciate the capability to encrypt the user's hard drive, ensuring access only with the recovery key. In an enterprise setup, we store all BitLocker keys on our server. So, whenever a user attempts to log in, the architecture authenticates with the key. This ensures that our data is secure. Even if the user's laptop is lost, we have confidence that the data remains inaccessible. So far, our user data is well-protected."
"The ease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked."
 

Cons

"They could improve the latency in the platform when entering the portal."
"Sometimes the performance rates are not consistent."
"Regarding the general topic of support, many have annoyances with it."
"While the solution works as it should, it is overly expensive."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The cost of maintaining the system is high for personal use."
"The response time for technical support could be faster."
"I would like to bring centralized management to mobile devices."
"The one thing that I know that they're working on, that's not quite there in the product, is the artificial intelligence aspect."
"The pricing should be improved."
"I would like to see improvement in the solution's central management of passwords. Currently, we install it separately."
"The migration itself is a nightmare."
"The console GUI could be better."
"The integration between Active Directory and BitLocker could be better."
"It needs a management console."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"The primary aspect for improvement lies in expanding our developer base, which would accelerate the development process and bring these enhancements to fruition"
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
Information not available
"Microsoft BitLocker is a free feature when you are using Microsoft solutions."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
"I don't know the costs. In terms of Microsoft licensing, we are at E3 on the business, and we're in the process of pricing out and moving to E5. So, a lot of this is included within our licensing agreements."
"Microsoft BitLocker's pricing is fair; I rate it a four out of ten."
"The product's cost is included in Windows."
"The solution is priced low. I would rate the product's pricing one out of ten."
"It operates on a subscription model on an annual basis."
"The solution is cost efficient."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
No data available
Government
10%
Financial Services Firm
9%
Manufacturing Company
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
No data available
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise10
Large Enterprise25
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with ...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have so...
Ask a question
Earn 20 points
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt th...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
 

Also Known As

No data available
McAfee MDP, MVISION Mobile
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
LeadQual
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: January 2026.
881,082 professionals have used our research since 2012.