Check Point Full Disk Encryption Software Blade Competitors and Alternatives

Get our free report covering Microsoft, Cisco, ESET, and other competitors of Check Point Full Disk Encryption Software Blade. Updated: June 2021.
512,711 professionals have used our research since 2012.

Read reviews of Check Point Full Disk Encryption Software Blade competitors and alternatives

HM
Information Security Senior Expert (Founding member, African Cybersecurity Center) at a financial services firm with 10,001+ employees
Real User
Top 5
Good performance for encryption that keeps your data secure and confidential

What is our primary use case?

We are using this solution to be compliant with CSP. After the cyberattacks, that impacted the Swift platform of the Bangladesh Bank, the Central Bank, and another bank in Africa. They created a custom security program that contains twenty-seven controls. One of those controls is to encrypt the infrastructure in the Swift platform. For the Swift operation, we acquired this solution for the servers and the Endpoints. We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data. This is a pilot project, deployed to be tested. After all of… more »

Pros and Cons

  • "We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
  • "If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution."

What other advice do I have?

Checkpoint has better support. With Symantec, we have subsidiaries involved. The performance is good and it's efficient. I would rate this solution a nine out of ten.
Get our free report covering Microsoft, Cisco, ESET, and other competitors of Check Point Full Disk Encryption Software Blade. Updated: June 2021.
512,711 professionals have used our research since 2012.