We performed a comparison between Check Point Full Disk Encryption Software Blade, Microsoft BitLocker, and Symantec Endpoint Encryption based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."It is a cross-platform tool."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"This encryption is relatively fast and really covers the needs required."
"The solution provides complete security for one's workstation."
"It keeps the devices well monitored."
"It has addressed storage and data transfer demands efficiently."
"The initial setup is easy."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"The solution is included in Windows 11."
"You can do a silent remote deployment very fast."
"As a Microsoft shop, we find this product easy to use."
"It's my understanding that the initial setup is straightforward."
"It maintains security on my computer. Since I travel a lot, it gives me confidence that if, for some reason, my computer is lost, my data won't be compromised."
"The most valuable feature is the TPM (Trusted Platform Module), which makes the PC security stronger because somebody who is not from the team cannot access the PC without the decryption PIN."
"It holds significant value as it reduces the need for extensive IT management to handle security across networks and environments"
"This product is a solid, all-in-one solution for enterprise data management."
"The best feature of Symantec Endpoint Encryption is the encryption itself. Encryption truly is the way to go because nowadays we are living in an era of widespread server threats, and you need to encrypt your emails and documents because you never know who might get hold of them."
"We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
"Its management is good, and it is also scalable and mostly stable."
"It is stable."
"The most valuable features are the messaging features and shared folders."
"The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop."
"One notable aspect is the ability to customize alerts and other settings."
"The price is high for small scale business enterprises."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The cost of maintaining the system is high for personal use."
"The response time for technical support could be faster."
"They should improve the interface and make it a little more user-friendly."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"Sometimes the performance rates are not consistent."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
"The console GUI could be better."
"I often have to make multiple attempts to log in."
"They could improve cloud integration regarding attribute and encryption key management."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"If integration with Active Directory are not mandatory for him, I think that there are many other solutions in the market that equal or are much stronger than Microsoft."
"The primary aspect for improvement lies in expanding our developer base, which would accelerate the development process and bring these enhancements to fruition"
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"I do not find the environment to be very user-friendly."
"Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."
"We would like some advanced security protection features."
"I think that they should improve the on-premises version to include the manageability and simplicity that is available on the cloud."
"One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom."
"The program's disk encryption is not very friendly with Microsoft OS updates. We have a problem with updates failing unless we use a time-consuming work-around."
"The initial setup is a bit complex."
"There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →