We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and Microsoft BitLocker based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"It's easily scalable and adaptable to the needs of the business."
"The solution provides complete security for one's workstation."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It helps us maximize the operational efficiency and performance of our activities."
"It has addressed storage and data transfer demands efficiently."
"The initial setup is easy."
"It keeps the devices well monitored."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"It's quite simple, and the advantage I see is that I get the trajectory of what happened inside the network, how a file has been transmitted to the workstation, and which files have got corrupted."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"The entirety of our network infrastructure is Cisco and the most valuable feature is the integration."
"The product itself is pretty reliable. The security features that it has make it reliable."
"Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
"One of the best features of AMP is its cloud feature. It doesn't matter where the device is in regards to whether it's inside or outside of your network environment, especially right now when everybody's remote and taken their laptops home. You don't have to be VPNed into the environment for AMP to work. AMP will work anywhere in the world, as long as it has an Internet connection. You get protection and reporting with it. No matter where the device is, AMP has still got coverage on it and is protecting it. You still have the ability to manage and remediate things. The cloud feature is the magic bullet. This is what makes the solution a valuable tool as far as I'm concerned."
"Its most valuable features are its scalability and advanced threat protection for customers."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"The manageability of it is a valuable feature."
"I like the simplicity and ease of use of this solution."
"The product is stable."
"Microsoft BitLocker's most valuable features are stability and simplicity in terms of usage."
"The most valuable feature is the TPM (Trusted Platform Module), which makes the PC security stronger because somebody who is not from the team cannot access the PC without the decryption PIN."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The hard drive encryption is very good."
"While the solution works as it should, it is overly expensive."
"The response time for technical support could be faster."
"The cost of maintaining the system is high for personal use."
"I would like to bring centralized management to mobile devices."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The tool should be able to recover data from a stolen device."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"Sometimes the performance rates are not consistent."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"We have had some problems with updates not playing nice with our environment. This is important, because if there is a new version, we need to test it thoroughly before it goes into production. We cannot just say, "There's a new version. It's not going to give us any problems." With the complexity of the solution using multiple engines for multiple tasks, it can sometimes cause performance issues on our endpoints. Therefore, we need to test it before we deploy. That takes one to three days before we can be certain that the new version plays nice with our environment."
"Cisco is good in terms of threat intelligence plus machine learning-based solutions, but we feel Cisco is lagging behind in using artificial intelligence in its systems."
"I would like them to add whatever makes filtering more advanced in scanning and blocking for malware in emails."
"We don't have issues. We think that Cisco covers all of the security aspects on the market. They continue to innovate in the right way."
"I would like more seamless integration."
"The GUI needs improvement, it's not good."
"The product does not provide options like tunnel creation or virtual appliances."
"I often have to make multiple attempts to log in."
"Technical support has not been very good."
"The people at the first level of support refer you to articles that do not pertain to the problem at hand."
"I would like to see improvement in the solution's central management of passwords. Currently, we install it separately."
"The solution’s user interface could be improved."
"The customizations could be more flexible."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"The initial setup is complex."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →