We performed a comparison between Check Point Pointsec [EOL], Lookout, and Microsoft BitLocker based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Mobile Data Protection."One of the characteristics that give us the most value is that it offers the ability to perform HTTPS inspections."
"Check Point GAiA is easy to use."
"At the time when this tool was launched on the market, it had new technologies integrated within."
"Full disk encryption helps us ensure that data stored on a device is encrypted."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is stable."
"The hard drive encryption is very good."
"The solution works the way it's supposed to - stability and scalability are fine."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"Being able to encrypt an entire hard disk has been most valuable."
"Technical support is excellent."
"I like the simplicity and ease of use of this solution."
"The UI was one of the most difficult points to get used to. Due to the UI, even though it was used every day, the administration was complicated."
"In the next release of this solution, I would like to see application identity support."
"The installation was quite complex."
"We would maybe want (in the future) advanced security in the filtering of access to the metaverse by augmented reality cameras."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"The implementation of BitLocker is not simple. There are many prerequisites and hours of study and testing."
"The product must improve the centralization of keys."
"The initial setup is complex."
"The solution could be improved if it was more user friendly."
"The solution lacks the ability to allow its user to provide limited access to someone."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"The pricing should be improved."
"It needs a management console."
Earn 20 points