Check Point Full Disk Encryption Software Blade vs Dell Encryption Enterprise [EOL] comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and Dell Encryption Enterprise [EOL] based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It has addressed storage and data transfer demands efficiently.""Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers.""It's easily scalable and adaptable to the needs of the business.""It keeps the devices well monitored.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.""It is a cross-platform tool.""This software has helped individuals in the organization avoid data loss."

More Check Point Full Disk Encryption Software Blade Pros →

"The technical support provided by Dell EMC comes with proactive technical support.""We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server.""One place where I can give them top level is the tiered administration, whereby you can assign roles to the support team to say, "You would be responsible for changing passwords. You would be responsible for system management and configurations, and you are the major admin of this." They have that on lockdown. The active directory integration is also pretty okay. It is not so bad. It does have normal features that most of the encryption tools have, such as full-disk encryption, volume encryption, and external drive encryption. I am not sure if they do file-level encryption and if DLP is integrated with the encryption product. I would like to assume that these features are there."

More Dell Encryption Enterprise [EOL] Pros →

Cons
"The tool should be able to recover data from a stolen device.""There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.""The response time for technical support could be faster.""They should improve the interface and make it a little more user-friendly.""The cost of maintaining the system is high for personal use.""I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."

More Check Point Full Disk Encryption Software Blade Cons →

"Some customers have less security in the solution regarding their data.""It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user.""As soon as we introduce any new tools or applications, we have to work with the back-end team to handle new problems that are created. Once they're figured out, the solution will stabilize, but the problems keep coming up whenever we introduce a new tool or application. It has been a challenge."

More Dell Encryption Enterprise [EOL] Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Top Answer:We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server.
    Top Answer:I see a lot of room for improvement in a couple of areas. One is that the decryption process is a bit complex and takes a lot of time, depending on how many files you have. If that can be improved, it… more »
    Top Answer:My company uses this solution for end-to-end encryption.
    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    630
    Comparisons
    312
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    Unranked
    In Endpoint Encryption
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Information Not Available
    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Information Not Available
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    No Data Available
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    No Data Available
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption. Updated: April 2024.
    768,740 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Dell Encryption Enterprise [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Encryption with 3 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Dell Encryption Enterprise [EOL] is rated 7.4. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Dell Encryption Enterprise [EOL] writes "Helpful auto-decryption features and great tech support, but problems with adding new applications and a time-consuming decryption process". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Dell Encryption Enterprise [EOL] is most compared with .

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.