Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint vs Sophos SafeGuard comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and Sophos SafeGuard based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has addressed storage and data transfer demands efficiently.""It helps us maximize the operational efficiency and performance of our activities.""It keeps the devices well monitored.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""Encryption prevents data loss which can cost the organization a lot of resources.""It's easily scalable and adaptable to the needs of the business.""The initial setup is easy.""This software has helped individuals in the organization avoid data loss."

More Check Point Full Disk Encryption Software Blade Pros →

"There are no issues or drops in the solution's performance...The solution's technical support was helpful.""Real-time threat prevention using sandboxing, file trajectory, and retrospective security.""It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities.""The integration with other Cisco products seemed to be really effective. We had Umbrella in place and we were using AnyConnect as well as Firepower. Once a threat was detected, being able to do the threat lookups and the live tracking was really useful.""Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us.""The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices.""The threat Grid with the ability to observe the sandboxing, analyze, and perform investigations of different malicious files has been great.""It is a very stable program."

More Cisco Secure Endpoint Pros →

"Security-wise, it's one of the best.""I like its ease of use the most. The management console is really nice. I like having one pane of glass that does everything. It does the Sophos anti-virus and encryption. Everything that you need is in one place. It is easy to use, and it is also pretty fast. It provides some pretty good details, and it lets you know who has access to a file. You can also add additional people to the encrypted documents, which is pretty good. Its stability and performance are also very good.""The setup process is straightforward.""I like that Sophos SafeGuard provides excellent technical support.""The most valuable features of the solution are the fact that they are able to encrypt the hard disk and to encrypt USB sticks.""With Sophos, I only need to generate the password and give that to a user to be able to allow them to login to the admin page of the Endpoint and do whatever they need to do. The user cannot go ahead and uninstall it. It's kept us much more secure because of this. Should any event happen on a particular system, I'm given the username and the system IP address. I get notifications and can deal with issues right away.""The solution has done a fabulous job of protecting us from threats.""I like the support most of all."

More Sophos SafeGuard Pros →

Cons
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.""The price is high for small scale business enterprises.""In the future, I would like to see is the ability to decrypt equipment.""They should improve the interface and make it a little more user-friendly.""Regarding the general topic of support, many have annoyances with it.""Sometimes the performance rates are not consistent.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""The tool should be able to recover data from a stolen device."

More Check Point Full Disk Encryption Software Blade Cons →

"The product does not provide options like tunnel creation or virtual appliances.""The one challenge that I see is the use of multiple endpoint protection platforms. For instance, we have AMP, but we also have Microsoft Windows Defender, System Center Endpoint Protection, and Microsoft Malware Protection Engine deployed. So, we have a bunch of different things that do the same thing. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it. But, one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system. AMP doesn't realize that and the file fetch fails, then you're left wondering what's going on.""The GUI needs improvement, it's not good.""On the firewall level, they were lagging a little bit behind, but they are running up again. I have full trust in the new 3000 series of firewalls where we would also be able to look more into the traffic that we're monitoring and get more security layers in our services. That would definitely be a big step.""In terms of the user experience, if the UX design could be much simpler [that would improve things]... if they could make it more intuitive for someone who is not an engineer so that they still can read what's going on in their webpage and understand, that would be something.""The reporting and analytics areas of the solution need to be improved.""They could improve the main dashboard to more clearly show me the things that I want to see. When I open the dashboard right now, I see a million things and they are not always the things that I need.""We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."

More Cisco Secure Endpoint Cons →

"The solution is not using other features like booting encryption, because it causes very heavy processing of the workstation. If they could find some way to handle the encryption and decryption to be lighter on the workstation it would be better.""In the next release, I would like to see more automation with the endpoint logging, but it's a special feature that is quite complicated to explain.""The solution's ability to integrate with other solutions, such as a DLP, should be addressed.""The Office 360 integration could be improved.""Once you lock a server, you won't be able to install or put something on that particular server, but on the PC or machines, the lockdown feature is not there, and it is a query our company raised when we had to provide details for Sophos' review.""The product's next release could have integration features with different internal and external systems.""SafeGuard's user interface is ugly and doesn't provide reports, so we have to go into the database and get information from there by creating queries.""It's a good product, but some are not happy with the boot BCN, and the point-to-point VPN requires the best protection."

More Sophos SafeGuard Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "​Pricing can be more expensive than similar software that does less functionality, but not recognized by customers.​"
  • "The costs of 50 licenses of AMP for three years is around $9,360."
  • "The price is very good."
  • "The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
  • "Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
  • "In our case, it is a straightforward annual payment through our Enterprise Agreement."
  • "Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
  • "There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
  • More Cisco Secure Endpoint Pricing and Cost Advice →

  • "The licensing costs depend on the series. For example, XG 85 can be around $200. If you go to ACC or to a four or five-year enterprise solution, you will find these devices can cost $10,000. It depends on the series."
  • "Licensing for this solution is on a yearly basis."
  • "The licenses are dependant on the number of users and computers you have to protect."
  • "We have a yearly license with Sophos which is around $1000-$1200 or so per annum. There are no additional costs beyond the standard licensing fee."
  • "Licensing is on a yearly basis and the pricing could be better."
  • "It would be great if the price of the solution was lower than the current price. If we are to sell this particular solution to smaller businesses and not just enterprise businesses it needs to be lower."
  • "We pay around $10 a year for each endpoint, including support."
  • "Pricing for Sophos SafeGuard could be improved because it could reach a thousand dollars depending on the product, edition, and software key purchased."
  • More Sophos SafeGuard Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in… more »
    Top Answer:The product provides sandboxing options like file reputation and file analysis.
    Top Answer:Pricing is a big issue. Some customers find the price reasonable. Some customers do not agree with the price.
    Top Answer:We must install an agent on every laptop. We do not know how to do it for the network. We shouldn’t have to install… more »
    Top Answer:It is one of the best products when it comes to stability.
    Top Answer:As a tool, Sophos SafeGuard is not optimized. I suggest that Sophos SafeGuard should be optimized so that it takes less… more »
    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    630
    Comparisons
    312
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    Views
    11,070
    Comparisons
    6,195
    Reviews
    20
    Average Words per Review
    935
    Rating
    8.3
    3rd
    out of 28 in Endpoint Encryption
    Views
    1,030
    Comparisons
    762
    Reviews
    10
    Average Words per Review
    438
    Rating
    8.7
    Comparisons
    Also Known As
    Cisco AMP for Endpoints
    SafeGuard, SafeGuard Encryption
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.

    Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.

    Reviews from Real Users

    Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.

    Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."

    Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."

    Protect your confidential information and comply with regulatory mandates safely and securely with SafeGuard Enterprise, Utimaco's comprehensive modular information protection platform. SafeGuard Enterprise is a modular information protection control platform that enforces policy-based security for PCs and mobile devices across mixed environments. SafeGuard Enterprise offers full transparency to end-users and is easy to administer from a single central console.
    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
    Rushmoor Borough Council
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    REVIEWERS
    Computer Software Company13%
    Financial Services Firm13%
    Healthcare Company10%
    Comms Service Provider10%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Government9%
    Financial Services Firm8%
    Manufacturing Company7%
    REVIEWERS
    Financial Services Firm24%
    Marketing Services Firm12%
    Computer Software Company12%
    Manufacturing Company12%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Government10%
    Comms Service Provider9%
    Financial Services Firm9%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    REVIEWERS
    Small Business32%
    Midsize Enterprise26%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business28%
    Midsize Enterprise18%
    Large Enterprise54%
    REVIEWERS
    Small Business63%
    Midsize Enterprise18%
    Large Enterprise18%
    VISITORS READING REVIEWS
    Small Business34%
    Midsize Enterprise14%
    Large Enterprise52%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption. Updated: April 2024.
    767,847 professionals have used our research since 2012.