Check Point Full Disk Encryption Software Blade Room for Improvement

AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. 

A lot of machine resources are consumed; they should improve the audit area of the tool and make it more It is also efficient to add some type of remote access functionality for data recovery or integration with policy management tools.

They must improve support and customer service, which is one of the factors where they have been failing the most in recent years.

View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

The support offered by the service desk is always a point in favor of Check Point; reliability and responsiveness are two words that can pretty accurately describe the impression it's left in us, and I talk for more people than just me. Though I admit, sometimes the performance rates are not consistent, and we've had time-sensitive experiences in which our expectations were partially met. All situations are different, and this was the exception to the rule in our organization's experience, but I've seen other people say it too.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

They could improve the latency in the platform when entering the portal.

They need to improve the time the first encryption takes. It affects the performance time a little too much. 

I've had negative experiences when it comes to receiving support. The response time is very slow and sometimes the agent changes and you have to explain everything again. In general, however, everything meets the needs very well. 

They should improve the encryption time on the units at the time of making a recovery of x unit. 

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
JH
Database Administrator at Ordina

When using a single-factor authentication process to protect data from cyber-attacks, it can be prone to attackers who can guess the domain password and access confidential information. 

The deployment process is simple when there are existing Check Point products in use. The free trial enables users to make a comprehensive decision before making a purchase decision. 

There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

In the future, I would like to see is the ability to decrypt equipment. When we have disasters and recover equipment, we need simpler processes. Today, the encrypted equipment recovery is a bit complex. We need a faster, simpler, and less complex solution and strategy for equipment recovery when they have failed so that administrators can recover that data more efficiently. In many cases, that information that is encrypted and has had an accident entails a lot of recovery effort and in some cases, it cannot be recovered reliably and quickly.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

I would like to bring centralized management to mobile devices. I would like Check Point to surprise us with these features in the future, being one of the best and most valued. It would be great if they supported us and reached the possibilities of portability to became more practical and functional with the new technologies. This possibility of new features helps us innovate and be more proactive in technological innovation. 

View full review »
RL
Head of the cyber defense operational unit at a government with 5,001-10,000 employees

While the solution works as it should, it is overly expensive. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

The tool should be able to recover data from a stolen device. They need to include data recovery options that allow us to recover important information safely and effectively. It's a little complex. You need a little knowledge. Additionally, it becomes complex when you need an immediate response for data recovery due to business issues or any other need. 

View full review »
AG
Planning Analyst at Ovato

I am familiar with set features, and the performance of this product is highly powerful. 

The cost of maintaining the system is high for personal use. 

Partitioning and setting up passwords is complicated for new users.

There is no low-volume storage package for small business enterprises. 

We have benefited from this product since we deployed it and have enjoyed its flexible features and high-performance capability. The variety of blades gives the users full data access control. 

I am impressed by the feature set's performance, and I totally recommend it to other companies.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow.

Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work.

Although they are excellent, they should improve their small problems to try to improve.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered.

As for the dashboard, I think it could be renewed to be more attractive to users.

As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.

View full review »
NG
Support at a security firm with 51-200 employees

The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.

The solution is always a blade, yet it must be purchased separately so that it can be integrated into the solution.

The documentation is sometimes from older devices, which is not all the same when implementing. They should replace the documentation with the most modern.                           

View full review »
SL
Software Engineer at CloudSense

I have experienced great improvement in the management of files and security. The capabilities of all the features have been reliable since we deployed this platform. The price is high for small-scale business enterprises. The vendor team should invest more resources in training customers for the effective use of this tool. There is a need for automated backup that is always on standby to ensure there is no loss of data when upgrading our hard drives. Most storage and security services that we have received have been effective.

View full review »
GG
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees

The response time for technical support could be faster.

View full review »
AC
Security And Network Administrator at a comms service provider with 501-1,000 employees

I cant speak to any aspects that are lacking. We don't feel there are any missing features. 

You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.