Compare Check Point Full Disk Encryption Software Blade vs. Oracle Advanced Security

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
447,546 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
447,546 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option.
Top Answer: Pricing is pretty similar between the competitors because you have to spend more money on a computer for AWS and less money for Oracle but the storage is a bit cheaper. I think that prices are very… more »
Top Answer: It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is… more »
Ranking
14th
out of 26 in Endpoint Encryption
Views
926
Comparisons
833
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
10th
out of 26 in Endpoint Encryption
Views
86
Comparisons
71
Reviews
1
Average Words per Review
551
Avg. Rating
7.0
Popular Comparisons
Learn
Check Point
Oracle
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Oracle Advanced Security provides data encryption and strong authentication services to the Oracle database, safeguarding sensitive data against unauthorized access from the network and the operating system. It also protects against theft, loss, and improper decommissioning of storage media and database backups.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Oracle Advanced Security
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)IBVI, illycaffe, Scottish water, trueblue, AirAsia
Top Industries
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider22%
Government18%
Financial Services Firm5%
No Data Available
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
447,546 professionals have used our research since 2012.
Check Point Full Disk Encryption Software Blade is ranked 14th in Endpoint Encryption while Oracle Advanced Security is ranked 10th in Endpoint Encryption with 1 review. Check Point Full Disk Encryption Software Blade is rated 0.0, while Oracle Advanced Security is rated 7.0. On the other hand, the top reviewer of Oracle Advanced Security writes "Has good data encryption and data reduction but the solution is constrained ". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, ESET Endpoint Encryption, WinMagic SecureDoc and Sophos SafeGuard, whereas Oracle Advanced Security is most compared with Microsoft BitLocker, IBM Guardium Data Protection and Micro Focus Voltage SecureData Enterprise.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.