We performed a comparison between Check Point Full Disk Encryption Software Blade and Symantec Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"It keeps the devices well monitored."
"This software has helped individuals in the organization avoid data loss."
"It's easily scalable and adaptable to the needs of the business."
"This encryption is relatively fast and really covers the needs required."
"The initial setup is easy."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"Encryption prevents data loss which can cost the organization a lot of resources."
"It has reduced the number of incidents related to the loss of information."
"The solution is pretty stable."
"It helps us put antivirus solutions in place and prevent malware from getting to our machines."
"You get updates and other encrypted files easily."
"It is fairly stable."
"We use it for protecting accounts, which is its most valuable feature."
"The solution is great for large-scale deployments."
"The management console gives us the ability to quickly control who sees what, ensures we are on the latest version, and up-to-date."
"The response time for technical support could be faster."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"Regarding the general topic of support, many have annoyances with it."
"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"I would like to bring centralized management to mobile devices."
"In the future, I would like to see is the ability to decrypt equipment."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"The solution presently doesn't let network folder encryption be done on Macintosh."
"The security could be improved."
"The solution does not have endpoint control."
"The GUI could use some enhancement, particularly in making option sets easier to locate on client machines."
"The solution does slow down the device a little bit, once it's installed."
"More features need to be included in the encryption software."
"It's difficult to integrate the solution with the DLP"
"Symantec Endpoint Encryption can improve by being more secure."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Symantec Endpoint Encryption is ranked 7th in Endpoint Encryption with 33 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Symantec Endpoint Encryption is rated 7.6. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Good encryption with a helpful central management console and excellent reliability". On the other hand, the top reviewer of Symantec Endpoint Encryption writes "Robust data protection with user-friendly deployment, competitive pricing, and comprehensive features like customizable alerts and effective detection capabilities but needs GUI improvements". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Symantec Endpoint Encryption is most compared with Microsoft BitLocker, McAfee Complete Data Protection, Cisco Secure Endpoint, Digital Guardian and ESET Endpoint Encryption. See our Check Point Full Disk Encryption Software Blade vs. Symantec Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.