"The initial setup is easy."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"The solution provides complete security for one's workstation."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"The solution works the way it's supposed to - stability and scalability are fine."
"There's a lot of manageability within the solution. This is very helpful."
"BitLocker is completely stable."
"The hard drive encryption is very good."
"It's my understanding that the initial setup is straightforward."
"The ease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable."
"It's a straightforward solution for encryption."
"While the solution works as it should, it is overly expensive."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The response time for technical support could be faster."
"The visualization could be better."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"Lacks a portal that can be managed rather than just existing."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"The people at the first level of support refer you to articles that do not pertain to the problem at hand."
"The console GUI could be better."
"I would like to be able to encrypt our cloud tenancy."
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.
BitLocker is Microsoft's full disk encryption solution, which protects all of your data from theft, hacking or loss. BitLocker does this by encrypting the entire drive that hosts your Windows operating system and all your data.
BitLocker is available for all devices, including portable storage devices (such as external hard drives and USB flash drives). These portable devices are supported by a feature called BitLocker To Go, which is included in Windows 7 and 8, and in Windows Server 2008 R2 and Windows Server 2012. In Windows XP, encrypted devices can be read, but not written to, using the BitLocker To Go Reader program.
Check Point Full Disk Encryption Software Blade is ranked 7th in Endpoint Encryption with 3 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 12 reviews. Check Point Full Disk Encryption Software Blade is rated 9.4, while Microsoft BitLocker is rated 7.2. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Easy to set up and stable with good technical support". On the other hand, the top reviewer of Microsoft BitLocker writes "Brings us in compliance, works with our Microsoft tools, and is pretty simple to deploy". Check Point Full Disk Encryption Software Blade is most compared with WinMagic SecureDoc, Cisco Secure Endpoint, ESET Endpoint Encryption and McAfee Complete Data Protection, whereas Microsoft BitLocker is most compared with McAfee Complete Data Protection, ESET Endpoint Encryption, Symantec Endpoint Encryption, Sophos SafeGuard and Boxcryptor. See our Check Point Full Disk Encryption Software Blade vs. Microsoft BitLocker report.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.