Check Point Full Disk Encryption Software Blade Primary Use Case

AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

Due to the fact that many users travel remotely from home or travel to different places in the country with the devices, a tool was needed that would provide us with the security and tranquility that the information would be safe on the devices that our users would access. This tool was acquired that gives us this disk encryption function, and with this, we can have better security in case said devices are stolen or lost and the information is safe at all times and in all places.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

The product allows for a variety of security controls for hard drives, local data, and files - even those within the operating system. It provides the capability of setting multi-factor authentication to prevent data and identity theft. Deployment is really easy to do both on a small and larger scale. 

It's easily scalable and adaptable to the needs of the business. In general terms, it's very user-friendly. It integrates with the other anti-malware Check Point software as a blade from the management gateway solution.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

In the organization, over a couple of years, various types of security and software solutions had been implemented, and we needed something for the data media recorder, such as USB hard drives, among others. We did some research on Check Point. We found it provided us with the functionalities that we needed to provide security for the data of the company and our employees. One of the important characteristics we found was that the agent that performs the recording functions does not consume as many resources as others do.

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
JH
Database Administrator at Ordina

This product provides data storage capabilities for both mobile and desktop devices. 

Data encryption enhances data safety and blocks breaches from cyber attackers. 

Check Point Full Disk Encryption Software Blade has a secure data backup that ensures we don't lose any information during disk upgrades. 

The software blade provides comprehensive security coverage and shields files stored in the disk from leaking. It supports various operating systems that we have installed with most computing devices.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

A problem due to the internal necessity of our organization is that all the content that comes out through a device needs to be encrypted. As a result of all these needs, we use solutions that provide the facility to encrypt, secure, and protect our removable media at all times inside or outside the organization. The internal necessity of our organization requires all the content that comes out through a device, computer, or portable medium to be encrypted, secure, and protected. This solution allows for that. The solution also offers good flexibility and has the possibility of being elastic.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

We required a solution that could support us in centrally locking down removable storage media such as USB flash drives, DVDs, or removable hard drives for maximum protection. 

This is so that users cannot, due to an error or carelessness, connect an infected device that compromises the services or operations of my organization. 

Above all, having all the activities centralized helps in notifying any activity, depending on the machine, port, and type of allocation, which may be violated. This is where we find a blocking and encryption solution at Check Point.

View full review »
RL
Head of the cyber defense operational unit at a government with 5,001-10,000 employees

We are using the most up-to-date version, software blades 82 through 85. 

We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

This is a disk encryption and filtering solution. Check Point provides us with full decryption software that has allowed us to protect critical company data on desktop and laptop computers. 

Check Point Full Disk Encryption Software Blade helps us ensure that critical data is protected at all times, even in case of loss or theft of equipment. Additionally, by complying with data privacy regulations, the company avoids potential penalties and damage to our corporate reputation. 

View full review »
AG
Planning Analyst at Ovato

This tool provides full-featured security to our hard drives, and any other user files stored. 

Viruses can corrupt stored information and delete user data without the user's knowledge. The authentication marks prevent unauthorized users from accessing confidential information without user consent. 

We had to look for a platform like this after increased cases of data mismanagement from our staff members. 

Setting up personal passwords for accessing saved files is easy. The set encryption models prevent data loss from malware attacks.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

 However, this blade is very good both on paper and in the testing.

The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company.

We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers.

It can be implemented easily with Harmony Endpoint.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained.

We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information.

Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements.

This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.

View full review »
NG
Support at a security firm with 51-200 employees

The tool provides security to the information found on user endpoint devices to prevent information from leaking outside the company. With this tool, we were able to do what was required to be able to provide this very important layer of security. 

View full review »
SL
Software Engineer at CloudSense

The entire organization's workloads are secure under this platform. Check Point Full Disk Encryption Software Blade secures the company information saved in hard drives. 

Data encryption enhances file safety and secures team collaboration. 

This platform automatically encrypts all information on the hard disks for effective safety. It blocks affected files that may contain viruses to stop spreading. Data saved is kept under classified folders for easy retrieval. The security blade has saved confidential information from leaking into unsafe environments.

View full review »
GG
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees

We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints.

This solution is available as an enterprise bundle, which we use on all of our endpoints.

View full review »
AC
Security And Network Administrator at a comms service provider with 501-1,000 employees

The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.

View full review »
KL
Senior Manager Information Security at a outsourcing company with 51-200 employees

We use Check Point Full Disk Encryption Software Blade to protect our mobile devices. We do not use a lot of the functionality of the solution, we only use FDE.

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.