Check Point Full Disk Encryption Software Blade vs McAfee Complete Data Protection comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and McAfee Complete Data Protection based on real PeerSpot user reviews.

Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is a cross-platform tool.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""The initial setup is easy.""Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers.""The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted.""The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.""It has addressed storage and data transfer demands efficiently.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."

More Check Point Full Disk Encryption Software Blade Pros →

"With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction.""With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution.""The interface is very good. You can create and manage your own dashboard.""Technical support is very helpful.""McAfee Complete Data Protection provides stability and is a good product.""It worked for me: it's easy to use and has been very effective.""The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud.""The new feature for online protection does a good job of identifying traits."

More McAfee Complete Data Protection Pros →

Cons
"The cost of maintaining the system is high for personal use.""I would like to bring centralized management to mobile devices.""The tool should be able to recover data from a stolen device.""They could improve the latency in the platform when entering the portal.""While the solution works as it should, it is overly expensive.""Sometimes the performance rates are not consistent.""In the future, I would like to see is the ability to decrypt equipment.""Regarding the general topic of support, many have annoyances with it."

More Check Point Full Disk Encryption Software Blade Cons →

"The disk encryption can be improved.""The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs.""There was an option for SQL setup in the older versions of this product and it has been removed, but we would like to see it made available as an add-on.""It is difficult to manage.""The solution's pricing could be better.""They need to segregate McAfee Complete Data Protection for endpoints and servers.""There are some features that do not work with Mac.""Though there may be some ransomware detection modules now in McAfee Complete Data Protection, it's a field that McAfee should focus on, particularly having integration with some EDR or other add-ons. This is so McAfee Complete Data Protection would have more accuracy in detecting new ransomware in the market. What I'd like to see in the next release of the solution is for its pricing to be more cost-effective because some competitors have cheaper pricing, so McAfee Complete Data Protection can't compete. Sometimes, some new vendors offer other solutions rather than McAfee Complete Data Protection, to win customers over, and this is a loss for McAfee."

More McAfee Complete Data Protection Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "The price of this solution needs to be improved."
  • "The price is good, it's a low-cost solution."
  • "This solution is reasonably priced."
  • "The pricing is better than that of some competing products."
  • "The pricing of the cloud offering seems confusing."
  • "I think the price could be a little bit less."
  • "McAfee Complete Data Protection is a little bit expensive."
  • "We currently have a contract option with McAfee Complete Data Protection."
  • More McAfee Complete Data Protection Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection… more »
    Top Answer:It worked for me: it's easy to use and has been very effective.
    Top Answer:The licensing is yearly, and the cost is pretty reasonable. I've only used the standard licensing options. I don't have to pay for the extra costs. It's not the cheapest; I'd rate it around six out of… more »
    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    594
    Comparisons
    288
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    3rd
    out of 28 in Endpoint Encryption
    Views
    2,765
    Comparisons
    1,998
    Reviews
    11
    Average Words per Review
    525
    Rating
    7.7
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Xcel Energy
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Solution Provider14%
    VISITORS READING REVIEWS
    Security Firm25%
    Computer Software Company22%
    Financial Services Firm16%
    Insurance Company4%
    REVIEWERS
    Computer Software Company20%
    Energy/Utilities Company13%
    Government13%
    Security Firm13%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company13%
    Government12%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business39%
    Midsize Enterprise11%
    Large Enterprise50%
    REVIEWERS
    Small Business55%
    Midsize Enterprise19%
    Large Enterprise26%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise15%
    Large Enterprise68%
    Buyer's Guide
    Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection
    March 2024
    Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection and other solutions. Updated: March 2024.
    772,679 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while McAfee Complete Data Protection is ranked 3rd in Endpoint Encryption with 32 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while McAfee Complete Data Protection is rated 7.8. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker and Cisco Secure Endpoint, whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint and Trend Micro Endpoint Encryption. See our Check Point Full Disk Encryption Software Blade vs. McAfee Complete Data Protection report.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.