Compare Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Check Point Full Disk Encryption Software Blade? Share your opinion.
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
447,228 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us.""The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year.""Licensing costs are on a yearly basis."

More ESET Endpoint Encryption Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
447,228 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: This solution can be centrally managed.
Top Answer: The updates could be improved and also done more frequently. I would like to see better compatibility with mobile devices. Most of the time, people are connecting to our server using their mobile… more »
Ranking
14th
out of 26 in Endpoint Encryption
Views
926
Comparisons
833
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
5th
out of 26 in Endpoint Encryption
Views
3,004
Comparisons
2,385
Reviews
4
Average Words per Review
426
Avg. Rating
8.8
Popular Comparisons
Learn
Check Point
ESET
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about ESET Endpoint Encryption
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)CCS Media Limited, Mercury Engineering, , Unigarant, Pinewood Healthcare
Top Industries
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider22%
Government18%
Financial Services Firm5%
VISITORS READING REVIEWS
Comms Service Provider32%
Computer Software Company18%
Media Company8%
Government7%
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
447,228 professionals have used our research since 2012.
Check Point Full Disk Encryption Software Blade is ranked 14th in Endpoint Encryption while ESET Endpoint Encryption is ranked 5th in Endpoint Encryption with 4 reviews. Check Point Full Disk Encryption Software Blade is rated 0.0, while ESET Endpoint Encryption is rated 8.8. On the other hand, the top reviewer of ESET Endpoint Encryption writes "Instead of installing the product on each machine at each location, we just do it remotely". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, WinMagic SecureDoc and Sophos SafeGuard, whereas ESET Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco AMP for Endpoints, Sophos SafeGuard and Trend Micro Endpoint Encryption.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.