Compare Check Point Full Disk Encryption Software Blade vs. Cisco Secure Endpoint

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Microsoft, Broadcom, McAfee and others in Endpoint Encryption. Updated: July 2021.
522,946 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The most valuable features of this solution are the IPS and the integration with ISE.""The simplicity of use is its most valuable feature. You can very clearly see things.""The stability of the solution is perfect. I believe it's the most stable solution on the market right now.""I am really satisfied with the technical support.""It is a very stable program.""The solution's integration capabilities are excellent. It's one of the best features.""It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.""Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."

More Cisco Secure Endpoint Pros »

Cons
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."

More Check Point Full Disk Encryption Software Blade Cons »

"In the next version of this solution, I would like to see the addition of local authentication.""The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device.""In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened.""The reporting and analytics areas of the solution need to be improved.""I would like more seamless integration.""The technical support is very slow.""I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products.""Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."

More Cisco Secure Endpoint Cons »

Pricing and Cost Advice
Information Not Available
"The costs of 50 licenses of AMP for three years is around $9,360.""The price is very good.""The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost.""Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc.""In our case, it is a straightforward annual payment through our Enterprise Agreement.""Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection.""There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization.""The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."

More Cisco Secure Endpoint Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
522,946 professionals have used our research since 2012.
Questions from the Community
Top Answer: I don't handle the pricing or anything like that. I don't actually get involved in the pricing or licensing aspects of the product.
Top Answer: I cant speak to any aspects that are lacking. We don't feel there are any missing features. You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the… more »
Top Answer: The most valuable feature is signature-based malware detection.
Top Answer: Licensing fees are on a yearly basis and I am happy with the pricing.
Top Answer: The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and detected as malware when they are not. They should work on some of the signatures… more »
Ranking
14th
out of 27 in Endpoint Encryption
Views
819
Comparisons
707
Reviews
0
Average Words per Review
0
Rating
N/A
Views
20,729
Comparisons
14,136
Reviews
16
Average Words per Review
1,516
Rating
8.8
Popular Comparisons
Also Known As
Cisco AMP for Endpoints
Learn More
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Cisco Secure Endpoint
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Top Industries
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider17%
Government13%
Financial Services Firm12%
REVIEWERS
Healthcare Company20%
Government13%
University7%
Comms Service Provider7%
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company22%
Government6%
Financial Services Firm5%
Company Size
No Data Available
REVIEWERS
Small Business37%
Midsize Enterprise15%
Large Enterprise48%
VISITORS READING REVIEWS
Small Business26%
Midsize Enterprise20%
Large Enterprise54%
Find out what your peers are saying about Microsoft, Broadcom, McAfee and others in Endpoint Encryption. Updated: July 2021.
522,946 professionals have used our research since 2012.

Check Point Full Disk Encryption Software Blade is ranked 14th in Endpoint Encryption with 1 review while Cisco Secure Endpoint is ranked 4th in Endpoint Protection for Business (EPP) with 17 reviews. Check Point Full Disk Encryption Software Blade is rated 10.0, while Cisco Secure Endpoint is rated 8.8. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Easy to set up and stable with good technical support". On the other hand, the top reviewer of Cisco Secure Endpoint writes "We have gained more visibility into what's going on because it detects a lot of threats". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, ESET Endpoint Encryption and WinMagic SecureDoc, whereas Cisco Secure Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Carbon Black CB Defense, SentinelOne and Cortex XDR by Palo Alto Networks.

See our list of .

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.