We performed a comparison between Check Point Full Disk Encryption Software Blade, Cisco Secure Endpoint, and McAfee Complete Data Protection based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."It's easily scalable and adaptable to the needs of the business."
"This encryption is relatively fast and really covers the needs required."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It has addressed storage and data transfer demands efficiently."
"It is a cross-platform tool."
"Encryption prevents data loss which can cost the organization a lot of resources."
"Cisco has definitely improved our organization a lot. In terms of business, our company feels safer. We actually switched from legacy signature-based solutions to threat intelligence-based and machine learning-based solutions, which is Cisco Secure. This has improved our security significantly, from 10% of signature-based technology security to 99.9% of the current one which we are running. We were happy."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"There are no issues or drops in the solution's performance...The solution's technical support was helpful."
"The product itself is pretty reliable. The security features that it has make it reliable."
"The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
"Among the most valuable features are the exclusions. And on the scalability side, we can integrate well with the SIEM orchestration engine and a number of applications that are proprietary or open source."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud."
"I have found the USB part most valuable."
"The most important feature of McAfee Complete Data Protection to my customers is the ePO or the management console. It's easy to use and it's scalable. You can also generate the reports you want on the console. It's a mature management console. The features that McAfee Complete Data Protection has, for example, anti-spam features and other features can also be found on other solutions, but the most unique feature you can find in the solution is the ePO itself, the management console."
"Reporting and encryption are its most valuable features."
"I am satisfied with the customer service/technical support."
"It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution."
"It is capable of acting as Web control, Device Control, or Data Control."
"It is part of the DLP and works well for that use case."
"The tool should be able to recover data from a stolen device."
"They should improve the interface and make it a little more user-friendly."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The price is high for small scale business enterprises."
"They could improve the latency in the platform when entering the portal."
"In the future, I would like to see is the ability to decrypt equipment."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"The solution needs more in-depth analytics."
"The integration of the Cisco products for security could be better in the sense that not everything is integrated, and they aren't working together. In addition, not all products are multi-tenant, so you can't separate different customer environments from each other, which makes it a little bit hard for a managed service provider to deliver services to the customers."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"It could be improved in connection with artificial intelligence and IoT."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"The reporting and analytics areas of the solution need to be improved."
"I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too."
"The solution needs to reduce the number of false positives. There are too many of them."
"We encountered several problems with the solution's stability."
"There are compatibility issues with the Chrome browser."
"They could be better in terms of Complete Data Protection."
"The solution needs more advanced features."
"The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs."
"It is difficult to manage."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
More McAfee Complete Data Protection Pricing and Cost Advice →