Check Point Full Disk Encryption Software Blade vs Microsoft BitLocker vs Trend Micro Mobile Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade, Microsoft BitLocker, and Trend Micro Mobile Security based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Mobile Data Protection.
To learn more, read our detailed Mobile Data Protection Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"This encryption is relatively fast and really covers the needs required.""It's easily scalable and adaptable to the needs of the business.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""It is a cross-platform tool.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.""The solution provides complete security for one's workstation.""The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.""It keeps the devices well monitored."

More Check Point Full Disk Encryption Software Blade Pros →

"It's very straightforward to recover data. It's safe for us; in case of lost information, it provides multiple options to recover the data.""It holds significant value as it reduces the need for extensive IT management to handle security across networks and environments""I like the simplicity and ease of use of this solution.""It is easy to implement and has AD integration.""Technical support is excellent.""It is easy to use. It is usually easy to recover someone's privacy. The manageability is much easier than McAfee. I think that Microsoft is a leader in this area. We are in the Microsoft school so our judgment of McAfee will be a little bit unfair as we recommend Microsoft all the time because of the easy manageability and support. I think that McAfee is designed for a different customer and every time we open a ticket with their support, it takes a very, very long time. The main difference is just the manageability and support. In terms of the solution itself or the functionality, I know that McAfee is very strong, but manageability and support, for us, is much more important. It's strengthens the solution for us.""Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM).""The most valuable feature of this solution is the protection and ease of use."

More Microsoft BitLocker Pros →

"Parental control""Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East.""Setting up the product is not too difficult.""This solution is able to protect the data, files, and folders that have been hijack or encrypted.""The Android protection, it’s faster.""Their ransomware protection is useful.""The solution offers a lot of custom features.""It will reduce the vulnerability level for safe browsing."

More Trend Micro Mobile Security Pros →

Cons
"The tool should be able to recover data from a stolen device.""They should improve the interface and make it a little more user-friendly.""The cost of maintaining the system is high for personal use.""While the solution works as it should, it is overly expensive.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""The response time for technical support could be faster.""The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered.""There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."

More Check Point Full Disk Encryption Software Blade Cons →

"Lacks a portal that can be managed rather than just existing.""The initial setup is complex.""The solution’s user interface could be improved.""They could improve cloud integration regarding attribute and encryption key management.""If the encryption was faster then it would make the experience more pleasant.""There are options which could be implemented to make it a little more like PGP Whole Disk Encryption.""The solution lacks the ability to allow its user to provide limited access to someone.""The only thing that could be slightly improved is the occasional stability issue."

More Microsoft BitLocker Cons →

"This solution is weak and cannot detect the latest ransomware.""There is always room for improvement in security.""The iOS protection: This is because Apple will “close” your smartphone.""There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow.""When the agent upgrades itself, it loses some settings and they need to be re-enabled manually.""Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful.""Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates.""Contact Backup."

More Trend Micro Mobile Security Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "BitLocker is already in Windows 10 and its price has already been "paid"."
  • "It is a totally free solution."
  • "This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
  • "It's not about pricing, because we are working with Enterprise companies that already have Windows Enterprise, so BitLocker comes already included as a Windows feature. It's free for Enterprise users. The price is only for deployment. The customer will pay for McAfee, however."
  • "The cost of this solution is bundled in with part of the subscription for the Microsoft Cloud. We have users subscribed to Enterprise E5 and it comes with E5"
  • "The price of this solution should be more competitive."
  • "BitLocker is included in our license and doesn't cost us anything extra."
  • "It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
  • More Microsoft BitLocker Pricing and Cost Advice →

  • "Very cheap in cost"
  • "Each license costs about $10/year. It's fairly inexpensive because it's a new product. In Pakistan, no more than two or three companies can apply for mobile protection right now. I don't know if there are ancillary costs above the standard licensing fee."
  • "We have a license that we renew yearly."
  • More Trend Micro Mobile Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mobile Data Protection solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in… more »
    Top Answer:Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive… more »
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive… more »
    Top Answer:The solution is not sold separately; it is part of a suite.
    Top Answer:Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their… more »
    Ranking
    3rd
    Views
    501
    Comparisons
    250
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    1st
    Views
    4,607
    Comparisons
    1,331
    Reviews
    27
    Average Words per Review
    366
    Rating
    8.7
    6th
    Views
    834
    Comparisons
    107
    Reviews
    2
    Average Words per Review
    365
    Rating
    7.5
    Comparisons
    Also Known As
    BitLocker, MS BitLocker
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    BitLocker is a full disk encryption solution that protects your data from theft, hacking, and loss. BitLocker achieves this by encrypting the entire drive that hosts your operating system and all your data. BitLocker can work on all operating systems, drives, or devices, including portable storage devices.

    After BitLocker completes the data encryption, it generates a recovery key. Only those with the correct encryption key will be able to decrypt and access the encrypted files and information. Attempts to access secured data on premises or over the network will be met with either authentication prompts or error messages saying the data cannot be accessed.

    BitLocker provides its users with peace of mind by improving security and reducing risks of critical data loss and intrusions.

    Benefits of Microsoft BitLocker

    • Comprehensive data protection: BitLocker encryption provides increased security for data throughout its lifecycle, which starts with the creation and storage of the data and ends with its removal. Encryption prevents important data from being accidentally revealed or stolen. When data is encrypted, stealing data is more difficult, and hackers are often discouraged from instigating a cyberattack.

    • BitLocker is free with Microsoft Windows: Microsoft BitLocker is free to use and very easy to set up.

    • Good performance: BitLocker does not make the computer slow down or freeze when in use. You are free to work on other processes with BitLocker running in the background. BitLocker’s interface is very intuitive and the process of encrypting and decrypting data is straightforward and fast.

    • Prevent unauthorized data modification: BitLocker helps to keep your computing environment safe from any unauthorized changes. BitLocker regularly inspects your boot settings every time your PC is turned on. When BitLocker notices that modifications have been made to your boot environment, it forces the PC to enter recovery mode.

    Reviews from Real Users

    Microsoft BitLocker stands out among its competitors for a number of reasons. Two major ones are its powerful encryption capabilities and its user-friendly user interface.

    An ICT operations and security manager notes, “It is free and native to the OS. We don't have to worry about upgrades or maintaining the product. You encrypt the disk, and you save the recovery key. That's it. The person puts their password in, and after that, it is up to them. If they forget their password, they have to bring it in to get it unlocked.”

    Kevin C., a director at Pathfinder, writes, “Theease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable.”

    Trend Micro Mobile Security Solutions includes Trend Micro Mobile Security for Android and Trend Micro Mobile Security for iOS devices that provide advanced comprehensive protection against ransonware, identity theft, phishing scams, fraudulent websites, etc and safeguards your privacy on Facebook and Twitter. It also includes Trend Micro Password Manager software that helps to securely store all passwords and sensitive information, to access them when needed on PCs, Macs, and mobile phones and tablets.
    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
    Alertboot, Babou, Ponsse
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    REVIEWERS
    Financial Services Firm24%
    Insurance Company12%
    Government12%
    Computer Software Company9%
    VISITORS READING REVIEWS
    Computer Software Company13%
    Government10%
    Financial Services Firm7%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider10%
    Healthcare Company8%
    Non Profit7%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    REVIEWERS
    Small Business45%
    Midsize Enterprise17%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise17%
    Large Enterprise56%
    REVIEWERS
    Small Business86%
    Midsize Enterprise14%
    VISITORS READING REVIEWS
    Small Business36%
    Midsize Enterprise13%
    Large Enterprise51%
    Buyer's Guide
    Mobile Data Protection
    March 2024
    Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Mobile Data Protection. Updated: March 2024.
    768,578 professionals have used our research since 2012.