We performed a comparison between Check Point Full Disk Encryption Software Blade and Oracle Advanced Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption."It's easily scalable and adaptable to the needs of the business."
"It helps us maximize the operational efficiency and performance of our activities."
"It is a cross-platform tool."
"This software has helped individuals in the organization avoid data loss."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option."
"The most valuable feature is the data encryption option for columns and tables."
"The response time for technical support could be faster."
"In the future, I would like to see is the ability to decrypt equipment."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The price is high for small scale business enterprises."
"I would like to bring centralized management to mobile devices."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The cost of maintaining the system is high for personal use."
"It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained."
"Having a single command to encrypt a table would be an improvement."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Earn 20 points
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Oracle Advanced Security is ranked 12th in Endpoint Encryption. Check Point Full Disk Encryption Software Blade is rated 8.6, while Oracle Advanced Security is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Oracle Data Masking and Subsetting and Protegrity Data Security.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.