We performed a comparison between Check Point Full Disk Encryption Software Blade and Microsoft BitLocker based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It helps us maximize the operational efficiency and performance of our activities."
"It's easily scalable and adaptable to the needs of the business."
"This encryption is relatively fast and really covers the needs required."
"The initial setup is easy."
"This software has helped individuals in the organization avoid data loss."
"It keeps the devices well monitored."
"Encryption prevents data loss which can cost the organization a lot of resources."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"The ease of administering and integrating the solution is great."
"While it helps mitigate unauthorized data access by enhancing file and system protection through encryption, the tool is really enhanced with the combination of other Microsoft Security and Compliance features like data labeling."
"It's my understanding that the initial setup is straightforward."
"It holds significant value as it reduces the need for extensive IT management to handle security across networks and environments"
"The tool has improved the starting up of our notebooks and end-user devices."
"I like BitLocker because it gives us strong encryption to protect our data."
"You can do a silent remote deployment very fast."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"They could improve the latency in the platform when entering the portal."
"The response time for technical support could be faster."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"They should improve the interface and make it a little more user-friendly."
"Sometimes the performance rates are not consistent."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"They should offer better login capabilities that are more secure."
"The solution’s user interface could be improved."
"Lacks a portal that can be managed rather than just existing."
"The initial setup is complex."
"The solution could be improved if it was more user friendly."
"Technical support has not been very good."
"The management of the product could be made a little easier."
"The console GUI could be better."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Microsoft BitLocker is rated 8.2. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Microsoft BitLocker writes "A solution that prevents unauthorized access and goes beyond security measures to provide protection to its users". Check Point Full Disk Encryption Software Blade is most compared with Cisco Secure Endpoint, whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, Symantec Endpoint Encryption, McAfee Complete Data Protection, Trend Micro Endpoint Encryption and Boxcryptor. See our Check Point Full Disk Encryption Software Blade vs. Microsoft BitLocker report.
See our list of best Endpoint Encryption vendors and best Mobile Data Protection vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.