Check Point Full Disk Encryption Software Blade vs Trend Micro Mobile Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and Trend Micro Mobile Security based on real PeerSpot user reviews.

Find out in this report how the two Mobile Data Protection solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers.""Encryption prevents data loss which can cost the organization a lot of resources.""The solution provides complete security for one's workstation.""It keeps the devices well monitored.""The initial setup is easy.""It has addressed storage and data transfer demands efficiently.""This software has helped individuals in the organization avoid data loss."

More Check Point Full Disk Encryption Software Blade Pros →

"The solution offers a lot of custom features.""Setting up the product is not too difficult.""This solution is able to protect the data, files, and folders that have been hijack or encrypted.""It will reduce the vulnerability level for safe browsing.""Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East.""The Android protection, it’s faster.""Parental control""Their ransomware protection is useful."

More Trend Micro Mobile Security Pros →

Cons
"Regarding the general topic of support, many have annoyances with it.""The tool should be able to recover data from a stolen device.""They should improve the interface and make it a little more user-friendly.""The response time for technical support could be faster.""Sometimes the performance rates are not consistent.""I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.""The price is high for small scale business enterprises.""While the solution works as it should, it is overly expensive."

More Check Point Full Disk Encryption Software Blade Cons →

"Contact Backup.""This solution is weak and cannot detect the latest ransomware.""When the agent upgrades itself, it loses some settings and they need to be re-enabled manually.""There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow.""Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful.""There is always room for improvement in security.""Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates.""The iOS protection: This is because Apple will “close” your smartphone."

More Trend Micro Mobile Security Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "Very cheap in cost"
  • "Each license costs about $10/year. It's fairly inexpensive because it's a new product. In Pakistan, no more than two or three companies can apply for mobile protection right now. I don't know if there are ancillary costs above the standard licensing fee."
  • "We have a license that we renew yearly."
  • More Trend Micro Mobile Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mobile Data Protection solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Top Answer:The solution is not sold separately; it is part of a suite.
    Top Answer:Trend Micro tends to drain the battery running in the background, but apart from that, they need to improve their updates. Additionally, an improvement that I want is for the dashboard to be more… more »
    Ranking
    3rd
    Views
    501
    Comparisons
    250
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    6th
    Views
    834
    Comparisons
    107
    Reviews
    2
    Average Words per Review
    365
    Rating
    7.5
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Trend Micro Mobile Security Solutions includes Trend Micro Mobile Security for Android and Trend Micro Mobile Security for iOS devices that provide advanced comprehensive protection against ransonware, identity theft, phishing scams, fraudulent websites, etc and safeguards your privacy on Facebook and Twitter. It also includes Trend Micro Password Manager software that helps to securely store all passwords and sensitive information, to access them when needed on PCs, Macs, and mobile phones and tablets.
    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Alertboot, Babou, Ponsse
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Comms Service Provider10%
    Healthcare Company8%
    Non Profit7%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    REVIEWERS
    Small Business86%
    Midsize Enterprise14%
    VISITORS READING REVIEWS
    Small Business36%
    Midsize Enterprise13%
    Large Enterprise51%
    Buyer's Guide
    Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security
    March 2024
    Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 3rd in Mobile Data Protection with 16 reviews while Trend Micro Mobile Security is ranked 6th in Mobile Data Protection with 8 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Trend Micro Mobile Security is rated 7.8. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Trend Micro Mobile Security writes "Good application control and the ability to expand but needs DLP features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Trend Micro Mobile Security is most compared with Lookout. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security report.

    See our list of best Mobile Data Protection vendors.

    We monitor all Mobile Data Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.