Compare Check Point Full Disk Encryption Software Blade vs. Micro Focus Voltage SecureData Enterprise

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Microsoft, Sophos, McAfee and others in Endpoint Encryption. Updated: June 2021.
512,221 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"I found some of their licensing is a bit complex. I am also finding that some of their cloud solutions are quite expensive."

More Micro Focus Voltage SecureData Enterprise Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
512,221 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: The number one feature I found was that the install was really easy, it was quite helpful.
Top Answer: I found some of their licensing is a bit complex. I am also finding that some of their cloud solutions are quite expensive. I am hoping the pricing would come down in the near future based on the… more »
Top Answer: Some of the complications we found were sometimes people did not like the type of changes that needed to happen, it was very difficult to get a product like that implemented into certain business… more »
Ranking
14th
out of 27 in Endpoint Encryption
Views
807
Comparisons
702
Reviews
0
Average Words per Review
0
Rating
N/A
9th
out of 27 in Endpoint Encryption
Views
986
Comparisons
775
Reviews
1
Average Words per Review
838
Rating
8.0
Popular Comparisons
Also Known As
Micro Focus SecureData, Voltage, SecureData, Voltage SecureData
Learn More
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Across industries-from compliance mandates such as PCI and GDPR to new IT initiatives such as data analytics and cloud migration-businesses rely on Voltage SecureData to secure their information at its core while at rest, in motion, and in use for comprehensive protection without gaps.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Micro Focus Voltage SecureData Enterprise
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
Epicor, Allegiant Travel Company, EnvisionRxOptions
Top Industries
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider17%
Government14%
Financial Services Firm12%
VISITORS READING REVIEWS
Computer Software Company27%
Financial Services Firm23%
Comms Service Provider12%
Retailer7%
Find out what your peers are saying about Microsoft, Sophos, McAfee and others in Endpoint Encryption. Updated: June 2021.
512,221 professionals have used our research since 2012.

Check Point Full Disk Encryption Software Blade is ranked 14th in Endpoint Encryption while Micro Focus Voltage SecureData Enterprise is ranked 9th in Endpoint Encryption with 1 review. Check Point Full Disk Encryption Software Blade is rated 0.0, while Micro Focus Voltage SecureData Enterprise is rated 8.0. On the other hand, the top reviewer of Micro Focus Voltage SecureData Enterprise writes "Effortless install, features rich, and scalable". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, ESET Endpoint Encryption and WinMagic SecureDoc, whereas Micro Focus Voltage SecureData Enterprise is most compared with Vormetric Data Security Platform, Protegrity Data Security, Oracle Advanced Security, IBM Guardium Data Protection and Vormetric Application Crypto Suite.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.