We performed a comparison between Check Point Full Disk Encryption Software Blade and Microsoft BitLocker based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It keeps the devices well monitored."
"The initial setup is easy."
"This software has helped individuals in the organization avoid data loss."
"It has addressed storage and data transfer demands efficiently."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It helps us maximize the operational efficiency and performance of our activities."
"The solution provides complete security for one's workstation."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The most valuable feature is the simplicity and integration with the Microsoft Clouds platform."
"The ease of administering and integrating the solution is great."
"You can do a silent remote deployment very fast."
"It's a straightforward solution for encryption."
"It is an encryption tool and provides security."
"There's a lot of manageability within the solution. This is very helpful."
"The manageability of it is a valuable feature."
"I like the fact that you can get a BitLocker encryption key out of OneDrive."
"I would like to bring centralized management to mobile devices."
"Sometimes the performance rates are not consistent."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"In the future, I would like to see is the ability to decrypt equipment."
"They should improve the interface and make it a little more user-friendly."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The price is high for small scale business enterprises."
"The product must improve the centralization of keys."
"The encryption takes a long time to complete, and our system runs very slowly while it is encrypting."
"I would recommend BitLocker only because of the economic side, not the technical side. If the features were included in the already existing licenses I would use it. If not, I would recommend other products."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"It's possible that the time it takes to pull items in to BitLocker could be reduced a bit."
"They could improve cloud integration regarding attribute and encryption key management."
"At the end of it all, we are looking for something that can be easier to manage."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Microsoft BitLocker is rated 8.2. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Microsoft BitLocker writes "User-friendly, easy to set up, and offers real-time machine status updates". Check Point Full Disk Encryption Software Blade is most compared with Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, McAfee Complete Data Protection, Symantec Endpoint Encryption, Trend Micro Endpoint Encryption and CyberArk Identity. See our Check Point Full Disk Encryption Software Blade vs. Microsoft BitLocker report.
See our list of best Endpoint Encryption vendors and best Mobile Data Protection vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.