"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"The solution provides complete security for one's workstation."
"The initial setup is easy."
"It will reduce the vulnerability level for safe browsing."
"The response time for technical support could be faster."
"While the solution works as it should, it is overly expensive."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"There is always room for improvement in security."
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.
Check Point Full Disk Encryption Software Blade is ranked 3rd in Mobile Data Protection with 3 reviews while Trend Micro Mobile Security is ranked 5th in Mobile Data Protection with 1 review. Check Point Full Disk Encryption Software Blade is rated 9.4, while Trend Micro Mobile Security is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Easy to set up and stable with good technical support". On the other hand, the top reviewer of Trend Micro Mobile Security writes "Easy to install, scales well, is reliable and has good support". Check Point Full Disk Encryption Software Blade is most compared with WinMagic SecureDoc, Microsoft BitLocker, Cisco Secure Endpoint, McAfee Complete Data Protection and Symantec Endpoint Encryption, whereas Trend Micro Mobile Security is most compared with Microsoft BitLocker, McAfee MVISION Mobile, Sophos Mobile and Lookout.
See our list of best Mobile Data Protection vendors.
We monitor all Mobile Data Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.