Check Point Full Disk Encryption Software Blade vs Oracle Advanced Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and Oracle Advanced Security based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.""The solution provides complete security for one's workstation.""Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers.""It keeps the devices well monitored.""The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""It is a cross-platform tool.""It has addressed storage and data transfer demands efficiently."

More Check Point Full Disk Encryption Software Blade Pros →

"The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option.""The most valuable feature is the data encryption option for columns and tables."

More Oracle Advanced Security Pros →

Cons
"I would like to bring centralized management to mobile devices.""There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.""The cost of maintaining the system is high for personal use.""Sometimes the performance rates are not consistent.""I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered.""While the solution works as it should, it is overly expensive."

More Check Point Full Disk Encryption Software Blade Cons →

"Having a single command to encrypt a table would be an improvement.""It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained."

More Oracle Advanced Security Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Ask a question

    Earn 20 points

    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    630
    Comparisons
    312
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    12th
    out of 28 in Endpoint Encryption
    Views
    530
    Comparisons
    389
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Oracle Advanced Security provides data encryption and strong authentication services to the Oracle database, safeguarding sensitive data against unauthorized access from the network and the operating system. It also protects against theft, loss, and improper decommissioning of storage media and database backups.

    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    IBVI, illycaffe, Scottish water, trueblue, AirAsia
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Government10%
    Computer Software Company10%
    Healthcare Company9%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise13%
    Large Enterprise73%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption. Updated: April 2024.
    768,740 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Oracle Advanced Security is ranked 12th in Endpoint Encryption. Check Point Full Disk Encryption Software Blade is rated 8.6, while Oracle Advanced Security is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Protegrity Data Security and Oracle Data Masking and Subsetting.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.