We performed a comparison between Check Point Full Disk Encryption Software Blade and McAfee Complete Data Protection based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Encryption prevents data loss which can cost the organization a lot of resources."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It's easily scalable and adaptable to the needs of the business."
"This software has helped individuals in the organization avoid data loss."
"It is a cross-platform tool."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"This encryption is relatively fast and really covers the needs required."
"McAfee Complete Data Protection provides stability and is a good product."
"I have found the USB part most valuable."
"It is capable of acting as Web control, Device Control, or Data Control."
"With respect to data loss prevention, I think it is helpful to the customer."
"The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints."
"Reporting and encryption are its most valuable features."
"The new feature for online protection does a good job of identifying traits."
"With this solution, the device control is more reliable and more stable."
"The tool should be able to recover data from a stolen device."
"While the solution works as it should, it is overly expensive."
"Sometimes the performance rates are not consistent."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The cost of maintaining the system is high for personal use."
"They could improve the latency in the platform when entering the portal."
"I would like to bring centralized management to mobile devices."
"In terms of where the solution could improve, it could integrate with network solutions for ADTs, email web gateways and discovery."
"The solution needs more advanced features."
"The solution needs to reduce the number of false positives. There are too many of them."
"Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice."
"We encountered several problems with the solution's stability."
"This solution does not do as well at protecting the end-user against unknown viruses."
"The disk encryption can be improved."
"It is difficult to manage."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
More McAfee Complete Data Protection Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while McAfee Complete Data Protection is ranked 5th in Endpoint Encryption with 31 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while McAfee Complete Data Protection is rated 8.2. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker and Cisco Secure Endpoint, whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint and Trend Micro Endpoint Encryption. See our Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.