We performed a comparison between Check Point Full Disk Encryption Software Blade and Microsoft BitLocker based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"The solution provides complete security for one's workstation."
"It's easily scalable and adaptable to the needs of the business."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It helps us maximize the operational efficiency and performance of our activities."
"It is a cross-platform tool."
"Encryption prevents data loss which can cost the organization a lot of resources."
"It keeps the devices well monitored."
"One significant aspect is that without the BitLocker key, you can't log in to the user's laptop. I appreciate the capability to encrypt the user's hard drive, ensuring access only with the recovery key. In an enterprise setup, we store all BitLocker keys on our server. So, whenever a user attempts to log in, the architecture authenticates with the key. This ensures that our data is secure. Even if the user's laptop is lost, we have confidence that the data remains inaccessible. So far, our user data is well-protected."
"The ease of administering and integrating the solution is great."
"Microsoft BitLocker's most valuable feature is endpoint encryption, and it's quite easy to manage."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The tool is stable."
"It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us."
"Microsoft BitLocker's most valuable features are stability and simplicity in terms of usage."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"They could improve the latency in the platform when entering the portal."
"The response time for technical support could be faster."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"Sometimes the performance rates are not consistent."
"Regarding the general topic of support, many have annoyances with it."
"The cost of maintaining the system is high for personal use."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The tool should be able to recover data from a stolen device."
"The solution lacks the ability to allow its user to provide limited access to someone."
"They could improve cloud integration regarding attribute and encryption key management."
"The primary aspect for improvement lies in expanding our developer base, which would accelerate the development process and bring these enhancements to fruition"
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"At the end of it all, we are looking for something that can be easier to manage."
"They should offer better login capabilities that are more secure."
"More customization options would have been nice, such as password selection, actions when the screen is locked, etc."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Microsoft BitLocker is rated 8.2. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Microsoft BitLocker writes "A solution that prevents unauthorized access and goes beyond security measures to provide protection to its users". Check Point Full Disk Encryption Software Blade is most compared with Cisco Secure Endpoint, whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, Symantec Endpoint Encryption, McAfee Complete Data Protection, Trend Micro Endpoint Encryption and Boxcryptor. See our Check Point Full Disk Encryption Software Blade vs. Microsoft BitLocker report.
See our list of best Endpoint Encryption vendors and best Mobile Data Protection vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.