We performed a comparison between Check Point Full Disk Encryption Software Blade and ESET Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The initial setup is easy."
"They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"It's easily scalable and adaptable to the needs of the business."
"It helps us maximize the operational efficiency and performance of our activities."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"Encryption prevents data loss which can cost the organization a lot of resources."
"It is a cross-platform tool."
"The product is easy to implement and configure."
"The most valuable feature is that everything is done on the server."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"This solution can be centrally managed."
"The initial setup is easy."
"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"ESET Endpoint Encryption works as an antivirus system."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"They could improve the latency in the platform when entering the portal."
"The tool should be able to recover data from a stolen device."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The price is high for small scale business enterprises."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"Sometimes the performance rates are not consistent."
"They should improve the interface and make it a little more user-friendly."
"Regarding the general topic of support, many have annoyances with it."
"From an admin perspective, the solution's UI could be more user-friendly."
"I would like to see better compatibility with mobile devices."
"ESET Endpoint Encryption needs to improve pricing and security."
"If you have issues with your network, you can't get updates, which is a problem."
"Integration with central management needs improvement."
"Sometimes the server console is very slow, so the performance could be improved."
"I would like more robust reporting as part of the Remote Administrator."
"There should be more frequent updates."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while ESET Endpoint Encryption is ranked 5th in Endpoint Encryption with 12 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while ESET Endpoint Encryption is rated 8.4. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Good encryption with a helpful central management console and excellent reliability". On the other hand, the top reviewer of ESET Endpoint Encryption writes "A reasonably priced solution that is an easy-to-use and effective at the same time". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas ESET Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, Symantec Endpoint Encryption and WinMagic SecureDoc. See our Check Point Full Disk Encryption Software Blade vs. ESET Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.