Check Point Full Disk Encryption Software Blade Valuable Features

AshleyMorales - PeerSpot reviewer
Cloud computing at ITQS

The tool offers some valuable features that we liked including: 

  • Full disk encryption, which provides full encryption integration of the hard drive, whether it is connected or removed from the device. 
  • Centralized management allows us to have an administration of policies, thus simplifying all the maintenance and organization of devices for inventories. 
  • Authentication is available as an additional security to the device. Before starting the OS, it requests some credentials to be able to access the data on the disk.
  • It is a cross-platform tool.
View full review »
Fabian Miranda - PeerSpot reviewer
Cloud computing at Tech Data Limited

We understand no security solution is infallible, so this Encryption Software Blade is a precaution. It's a layer of protection we can use preventively and reactively even after there's been unallowed access to any of the company's systems. 

It's proven to be a very reliable solution. For example, once we had a phishing infection case that, even though it was neutralized really fast, we preferred to encrypt the hard drive as a preventive measure while we probed the length of the infection's reach. We acted fast and from the central console minimizing the potential damage.

View full review »
Adrian Cambronero - PeerSpot reviewer
Consultant at ITQS

Check Point Full Disk Encryption Software Blade presents very reliable characteristics. 

It keeps the devices well monitored. This is very important for IT administrators. They can have control as activities and functions can be stored to later be able to do a forensic audit and extract relevant statistics for the organization. 

In addition to all this, it is a straightforward product to administer and configure and also offers the functionality for updates without affecting the characteristics that have been already implemented. Like all good tools, it has alerts via email.

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
JH
Database Administrator at Ordina

Integration with the Windows operating system took place effectively. 

The product is designed to serve enterprises efficiently. 

The Check Point security infrastructure prevents files from leaking to unauthorized users. 

The endpoint policy management software blade policies have the capability to monitor performance and control its functionalities. 

The product supports multifactor authentication that helps the user to set passwords for protecting smart cards and cryptographic tokens. 

It is easy to learn how the user interface operates and find any saved document faster and more conveniently.

View full review »
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at Acobo

In many cases, we have had the need to share information and send it outside of our organization. Users who need this functionality have had a good experience as it is very easy to encrypt removable devices with the ability to just right-click and encrypt the content. This makes the product fast, simple, and flexible.

We have a lot of peace of mind since this solution encrypts the equipment, and encrypts the C: or D: units. 

One of its most valuable features is the possibility of silent encryption. The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted. Instead, it is a silent, strategic ally to ensure all information is safe without the need for the user to feel or perceive a struggle in performance.

View full review »
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS

Above all, the most useful aspect is the possibility of keeping our data safe by placing a unique digital signature for each device we will encrypt. It's informing us of any unauthorized changes. It is one of the most valuable features. Still, we cannot forget that Check Point offers us the User Check portal to involve and be able to give good active training to our users. They access portable media to be able to identify possible incidents. Above all, the possibility of seeing everything from a centralized portal is quite useful. 

View full review »
RL
Head of the cyber defense operational unit at a government with 5,001-10,000 employees

The solution provides complete security for one's workstation. 

View full review »
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees

Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers. It has given us the ability to secure the data. This capacity is proportional to full disk encryption and secures everything together via the centralized management of the policies. We now have the ability to decrypt and see the data being encrypted quickly and easily.

View full review »
AG
Planning Analyst at Ovato

Automatic data encryption protects stored files from landing in the hands of unauthorized members. 

When we save our virtual meeting videos and other files there is a security guarantee, and no one can interfere with the confidential information. 

It helps back up files and keeps them safe until they are needed for reference. 

The virus protection models prevent the disk from transmitting viruses when sharing files among colleagues. 

Classifying folders and allocating space to various programs saves time when retrieving data.

View full review »
LD
Cloud Support at a tech company with 1-10 employees

One of the most interesting functions that Check Point Full Disk Encryption Software Blade is that it can make it easy for massive implementation through the centralized administration portal where we can remotely take control of the protected units as well as offline.

This feature, in addition to encrypting, provides protection to prevent. If a device is lost, the information it contains cannot be deciphered. In our company, this functionality was promoted by the Check Point vendor according to our needs and the capabilities it provides.

It's an easy implementation with plenty of guide information.

View full review »
Diana Alvarado - PeerSpot reviewer
Security Admin at a tech services company with 51-200 employees

For the company, the great characteristic of this tool is its centralized environment which offers the management of the tool from Check Point Security Management.

On the other hand, the implementation of self-management policies on devices is quite easy to implement, generating speed.

The algorithms implemented by Check Point Full Disk Encryption Software Blade are very secure, and this generates a lot of confidence in the tool.

Finally, this tool can be implemented in an existing Check Point gateway environment to keep everything in one place.

View full review »
NG
Support at a security firm with 51-200 employees

The best features of Full Disk Encryption include:

  • End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system.
  • Pre-boot authentication is used to ensure that only authorized users can access the device and its encrypted data. building trust among users who use the product efficiently.
  • Centralized management.
  • Safe recovery.
View full review »
SL
Software Engineer at CloudSense

The security features safeguard our files from ransomware attacks. 

This tool has enabled us to set file management policies that can be observed to enhance efficient data management. 

Encryption prevents data loss which can cost the organization a lot of resources. 

The pricing and licensing terms are flexible and easy to maintain. The customer support staff is dedicated to offering timely services and providing solutions to any request. 

It is easy to use the UI and interact with the data management dashboards.

View full review »
GG
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees

They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.

It has been proven to be completely effective with us. We haven't had anything related to threats pass through our system in the last five years.

It is easy to use. 

When a new version becomes available, it automatically updates. The update is seamless, regardless of the features you have, because some features will not apply to clinics depending on what we use. We don't have a pre-built screen.

Whether it is a laptop or a desktop, we can customize it so that it does not interfere with our operations.

We do not need to change our security because it is superior to that of the Department of Technology.

View full review »
AC
Security And Network Administrator at a comms service provider with 501-1,000 employees

The solution is pretty reliable.

The initial setup is easy.

The stability is very good.

Technical support is pretty good.

View full review »
KL
Senior Manager Information Security at a outsourcing company with 51-200 employees

The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.

View full review »
Buyer's Guide
Check Point Full Disk Encryption Software Blade
April 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.