We performed a comparison between Check Point Full Disk Encryption Software Blade and Trend Micro Mobile Security based on real PeerSpot user reviews.
Find out in this report how the two Mobile Data Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"Encryption prevents data loss which can cost the organization a lot of resources."
"The solution provides complete security for one's workstation."
"It keeps the devices well monitored."
"The initial setup is easy."
"It has addressed storage and data transfer demands efficiently."
"This software has helped individuals in the organization avoid data loss."
"The solution offers a lot of custom features."
"Setting up the product is not too difficult."
"This solution is able to protect the data, files, and folders that have been hijack or encrypted."
"It will reduce the vulnerability level for safe browsing."
"Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East."
"The Android protection, it’s faster."
"Parental control"
"Their ransomware protection is useful."
"Regarding the general topic of support, many have annoyances with it."
"The tool should be able to recover data from a stolen device."
"They should improve the interface and make it a little more user-friendly."
"The response time for technical support could be faster."
"Sometimes the performance rates are not consistent."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"The price is high for small scale business enterprises."
"While the solution works as it should, it is overly expensive."
"Contact Backup."
"This solution is weak and cannot detect the latest ransomware."
"When the agent upgrades itself, it loses some settings and they need to be re-enabled manually."
"There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow."
"Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful."
"There is always room for improvement in security."
"Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates."
"The iOS protection: This is because Apple will “close” your smartphone."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Mobile Data Protection with 16 reviews while Trend Micro Mobile Security is ranked 6th in Mobile Data Protection with 8 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Trend Micro Mobile Security is rated 7.8. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Trend Micro Mobile Security writes "Good application control and the ability to expand but needs DLP features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Trend Micro Mobile Security is most compared with Lookout. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security report.
See our list of best Mobile Data Protection vendors.
We monitor all Mobile Data Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.