Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs McAfee Total Protection for Data Loss Prevention vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Endpoint Encryption
Data Loss Prevention (DLP)
Endpoint Encryption
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
VivekGupta7 - PeerSpot reviewer
Versatile with good patching and a straightforward setup
There is some fine-tuning needed, even once you define something. We need to do a lot of configuration. It would be easier if they made the configuration simpler, especially in the beginning. They need to give the user more choices and provide more guidance to help avoid problems later on. We'd like some more built-in predictive analytics so we can be prepared for what might happen in the future. We did have some bandwidth issues during setup. If your update fails, you may have stability issues. We find it difficult to reach higher levels of support when we face larger issues.
Ibrahin Gamal - PeerSpot reviewer
Data protection improves while users adapt to user access complexities
Recovery options are useful with Microsoft BitLocker. When we get the recovery key from Microsoft, people who we show how BitLocker works did not know the facts about BitLocker. When we tell them about recovery keys, it is very difficult for them to get to the users who have issues in their PCs and do not have the knowledge. When IT asked about the scenario, it was difficult for them. They needed something where they could go to the administration portal to unlock the PC for the user, but we tell them that when a user asks for a recovery key, it consists of 32 numbers to unlock their PC. They observed cost savings after implementing Microsoft BitLocker because they requested BitLocker with System Center. They found that it did not have a high cost, as it is a built-in feature in Windows. When they asked about other solutions, it was very expensive for large numbers in other corporates or organizations. They were very satisfied with Microsoft BitLocker with System Center Configuration Manager.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"This encryption is relatively fast and really covers the needs required."
"It is a cross-platform tool."
"It helps us maximize the operational efficiency and performance of our activities."
"Encryption prevents data loss which can cost the organization a lot of resources."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"This software has helped individuals in the organization avoid data loss."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"What I like about McAfee Total Protection is that it's working. I also like that it doesn't require any specific knowledge to set up."
"The solution has good stability and endpoint."
"The product provides us with an excellent, dependable solution to recommend to clients for their security needs."
"The ability to block all USBs from the McAfee portal has been great."
"The solution is stable."
"The interface showcases threat incidents very well."
"The most valuable feature is the ability to control access to USB drives and other external devices."
"The initial setup process was easy."
"Feature-wise we have the ability to encrypt fast."
"The solution is included in Windows 11."
"The solution's most valuable feature is that it is simple to deploy and manage."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"As a Microsoft shop, we find this product easy to use."
"It seemed easy, straightforward, and secure."
"The manageability of it is a valuable feature."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
 

Cons

"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"In the future, I would like to see is the ability to decrypt equipment."
"Regarding the general topic of support, many have annoyances with it."
"They should improve the interface and make it a little more user-friendly."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"Sometimes the performance rates are not consistent."
"The tool should be able to recover data from a stolen device."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"Technical support doesn't really offer fast response times."
"The licensing cost for McAfee Total Protection could be cheaper, but apart from that, I don't need anything else. The software has what I need."
"The pricing is high for licensing and support and the GUI interface is good but could use updating."
"The solution needs an easier integration in heterogeneous and dynamic environments."
"The solution needs to be a one-stop protection shop. And yet, the DLP isn't strong. Anyone can break it quite easily."
"The product fails to offer automatic classification capabilities to its users."
"Our client is not very happy with the lack of support, the skills, and the effectiveness of the tool."
"McAfee Total Protection for Data Loss Prevention could improve by making the customer aware of the benefits of the solution which would increase the adoption. Additionally, if there were features to suit multi-cloud environments it would be helpful. If the solution can intelligently identify which is important data for the organization and should not be released from the organization without authorization would be a benefit."
"The solution could improve by having a centralized GUI for management."
"The migration itself is a nightmare."
"The only thing that could be slightly improved is the occasional stability issue."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"The visualization could be better."
"The product must improve the centralization of keys."
"There is room for improvement in stability."
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"McAfee Total Protection for Data Loss Prevention is an expensive solution."
"The price is high for this type of product."
"The price of the solution could improve."
"If the client purchases the entire suite of McAfee Endpoint, the license is included."
"The price of the solution could improve, it is expensive. We typically sell one and three-year licenses."
"There is an annual license to use this solution."
"McAfee Total Protection for Data Loss Prevention is expensive."
"The price of McAfee Total Protection for Data Loss Prevention is expensive. It is not the most expensive solution but it is typically 15 to 20 percent higher than other solutions. There is no additional cost to using McAfee Total Protection for Data Loss Prevention."
"The solution is cost efficient."
"It's not about pricing, because we are working with Enterprise companies that already have Windows Enterprise, so BitLocker comes already included as a Windows feature. It's free for Enterprise users. The price is only for deployment. The customer will pay for McAfee, however."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
"BitLocker is included in our license and doesn't cost us anything extra."
"I think it's reasonably priced because I've never heard any complaints from my company about its costs."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"I don't know the costs. In terms of Microsoft licensing, we are at E3 on the business, and we're in the process of pricing out and moving to E5. So, a lot of this is included within our licensing agreements."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
855,347 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
25%
Security Firm
10%
Financial Services Firm
8%
Government
8%
Computer Software Company
14%
Financial Services Firm
14%
Retailer
7%
Non Profit
6%
Computer Software Company
11%
Government
11%
Manufacturing Company
9%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with ...
What do you like most about McAfee Total Protection for Data Loss Prevention?
The tool focuses on endpoints rather than networks. Endpoints cover everything. It wouldn't be possible to steal conf...
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt th...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive en...
 

Also Known As

No data available
McAfee Total Protection for Data, McAfee Total Protection for DLP, Total Protection for Data, Intel Security Total Protection for Data
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Kleberg Bank
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: June 2025.
855,347 professionals have used our research since 2012.