Compare Check Point Pointsec vs. Voltage SecureData

Check Point Pointsec is ranked 11th in Endpoint Encryption with 1 review while Voltage SecureData is ranked 18th in Endpoint Encryption. Check Point Pointsec is rated 7.0, while Voltage SecureData is rated 0. The top reviewer of Check Point Pointsec writes "Stable and easy to use, but it needs application identity support". On the other hand, Check Point Pointsec is most compared with , whereas Voltage SecureData is most compared with Vormetric Data Security Platform, Protegrity Data Security and Digital Guardian.
Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Microsoft, Symantec, Sophos and others in Endpoint Encryption. Updated: May 2020.
419,360 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
419,360 professionals have used our research since 2012.
Ranking
11th
out of 27 in Endpoint Encryption
Views
351
Comparisons
262
Reviews
1
Average Words per Review
307
Avg. Rating
7.0
18th
out of 27 in Endpoint Encryption
Views
431
Comparisons
343
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Top Comparisons
Also Known As
PointsecMicro Focus SecureData, Voltage, SecureData
Learn
Check Point
Micro Focus
Overview
Information Not Available
Across industries-from compliance mandates such as PCI and GDPR to new IT initiatives such as data analytics and cloud migration-businesses rely on Voltage SecureData to secure their information at its core while at rest, in motion, and in use for comprehensive protection without gaps.
Offer
Learn more about Check Point Pointsec
Learn more about Voltage SecureData
Sample Customers
Glatfelter
Information Not Available
Find out what your peers are saying about Microsoft, Symantec, Sophos and others in Endpoint Encryption. Updated: May 2020.
419,360 professionals have used our research since 2012.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.