We performed a comparison between Check Point Full Disk Encryption Software Blade and Oracle Advanced Security based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The solution provides complete security for one's workstation."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"It keeps the devices well monitored."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It is a cross-platform tool."
"It has addressed storage and data transfer demands efficiently."
"The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option."
"The most valuable feature is the data encryption option for columns and tables."
"I would like to bring centralized management to mobile devices."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The cost of maintaining the system is high for personal use."
"Sometimes the performance rates are not consistent."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"While the solution works as it should, it is overly expensive."
"Having a single command to encrypt a table would be an improvement."
"It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Earn 20 points
Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Oracle Advanced Security is ranked 12th in Endpoint Encryption. Check Point Full Disk Encryption Software Blade is rated 8.6, while Oracle Advanced Security is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Protegrity Data Security and Oracle Data Masking and Subsetting.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.