We performed a comparison between Check Point Full Disk Encryption Software Blade and Trend Micro Mobile Security based on real PeerSpot user reviews.
Find out in this report how the two Mobile Data Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It keeps the devices well monitored."
"It's easily scalable and adaptable to the needs of the business."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"This software has helped individuals in the organization avoid data loss."
"The initial setup is easy."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It helps us maximize the operational efficiency and performance of our activities."
"Setting up the product is not too difficult."
"This solution is able to protect the data, files, and folders that have been hijack or encrypted."
"Parental control"
"It will reduce the vulnerability level for safe browsing."
"The Android protection, it’s faster."
"The solution offers a lot of custom features."
"Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East."
"Their ransomware protection is useful."
"The response time for technical support could be faster."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"I would like to bring centralized management to mobile devices."
"The price is high for small scale business enterprises."
"They could improve the latency in the platform when entering the portal."
"Regarding the general topic of support, many have annoyances with it."
"Sometimes the performance rates are not consistent."
"The cost of maintaining the system is high for personal use."
"There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow."
"When the agent upgrades itself, it loses some settings and they need to be re-enabled manually."
"Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful."
"This solution is weak and cannot detect the latest ransomware."
"The iOS protection: This is because Apple will “close” your smartphone."
"Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates."
"There is always room for improvement in security."
"Contact Backup."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Mobile Data Protection with 16 reviews while Trend Micro Mobile Security is ranked 6th in Mobile Data Protection with 8 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Trend Micro Mobile Security is rated 7.8. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Trend Micro Mobile Security writes "Good application control and the ability to expand but needs DLP features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Trend Micro Mobile Security is most compared with Lookout. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security report.
See our list of best Mobile Data Protection vendors.
We monitor all Mobile Data Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.