We performed a comparison between Check Point Full Disk Encryption Software Blade and Symantec Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It has addressed storage and data transfer demands efficiently."
"Encryption prevents data loss which can cost the organization a lot of resources."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"The solution provides complete security for one's workstation."
"This encryption is relatively fast and really covers the needs required."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"The best feature of Symantec Endpoint Encryption is the encryption itself. Encryption truly is the way to go because nowadays we are living in an era of widespread server threats, and you need to encrypt your emails and documents because you never know who might get hold of them."
"The solution’s installation was easy."
"The installation process is pretty straightforward."
"We have been very satisfied with the solution's security capabilities."
"Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
"The management console gives us the ability to quickly control who sees what, ensures we are on the latest version, and up-to-date."
"You get updates and other encrypted files easily."
"We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
"I would like to bring centralized management to mobile devices."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"While the solution works as it should, it is overly expensive."
"They should improve the interface and make it a little more user-friendly."
"They could improve the latency in the platform when entering the portal."
"The cost of maintaining the system is high for personal use."
"The tool should be able to recover data from a stolen device."
"The solution does not have endpoint control."
"Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."
"The security could be improved."
"The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product."
"The product can be expensive. Price was a factor in moving away from the product."
"Symantec Endpoint Encryption can improve by being more secure."
"Its decryption time needs to be improved. Currently, its decryption time is very long, and it takes double time than encryption. They need to work on that. Its encryption time is fine."
"One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Symantec Endpoint Encryption is ranked 7th in Endpoint Encryption with 34 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Symantec Endpoint Encryption is rated 7.6. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Symantec Endpoint Encryption writes "Provides a centralized management console and a straightforward initial setup process ". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Symantec Endpoint Encryption is most compared with Microsoft BitLocker, McAfee Complete Data Protection, Cisco Secure Endpoint, Digital Guardian and WinMagic SecureDoc. See our Check Point Full Disk Encryption Software Blade vs. Symantec Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.