We performed a comparison between Check Point Full Disk Encryption Software Blade, Microsoft BitLocker, and Trend Micro Mobile Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Mobile Data Protection."It keeps the devices well monitored."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It has addressed storage and data transfer demands efficiently."
"The initial setup is easy."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"This software has helped individuals in the organization avoid data loss."
"It is an encryption tool and provides security."
"Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
"It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked."
"I like the simplicity and ease of use of this solution."
"The tool has improved the starting up of our notebooks and end-user devices."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"The platform provides good performance."
"It is easy to implement and has AD integration."
"Their ransomware protection is useful."
"The Android protection, it’s faster."
"Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East."
"Parental control"
"It will reduce the vulnerability level for safe browsing."
"The solution offers a lot of custom features."
"This solution is able to protect the data, files, and folders that have been hijack or encrypted."
"Setting up the product is not too difficult."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"Regarding the general topic of support, many have annoyances with it."
"Sometimes the performance rates are not consistent."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"While the solution works as it should, it is overly expensive."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The response time for technical support could be faster."
"It needs a management console."
"The migration itself is a nightmare."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"The solution could improve by having a centralized GUI for management."
"The initial setup is complex."
"The solution lacks the ability to allow its user to provide limited access to someone."
"Lacks a portal that can be managed rather than just existing."
"They can improve the security of the application and include an encryption disk in the next feature."
"This solution is weak and cannot detect the latest ransomware."
"Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful."
"Contact Backup."
"There is always room for improvement in security."
"Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates."
"When the agent upgrades itself, it loses some settings and they need to be re-enabled manually."
"There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow."
"The iOS protection: This is because Apple will “close” your smartphone."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →