We changed our name from IT Central Station: Here's why

Check Point Full Disk Encryption Software Blade OverviewUNIXBusinessApplication

Check Point Full Disk Encryption Software Blade is #3 ranked solution in top Mobile Data Protection tools and #7 ranked solution in top Endpoint Encryption tools. PeerSpot users give Check Point Full Disk Encryption Software Blade an average rating of 10 out of 10. Check Point Full Disk Encryption Software Blade is most commonly compared to WinMagic SecureDoc: Check Point Full Disk Encryption Software Blade vs WinMagic SecureDoc. The top industry researching this solution are professionals from a computer software company, accounting for 26% of all views.
What is Check Point Full Disk Encryption Software Blade?

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Buyer's Guide

Download the Endpoint Encryption Buyer's Guide including reviews and more. Updated: January 2022

Check Point Full Disk Encryption Software Blade Customers

Osmose, International Fund for Animal Welfare (IFAW)

Check Point Full Disk Encryption Software Blade Video

Check Point Full Disk Encryption Software Blade Pricing Advice

What users are saying about Check Point Full Disk Encryption Software Blade pricing:
"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."

Check Point Full Disk Encryption Software Blade Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Security And Network Administrator at a comms service provider with 501-1,000 employees
Real User
Top 20
Easy to set up and stable with good technical support
Pros and Cons
  • "The initial setup is easy."
  • "You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."

What is our primary use case?

The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.

What is most valuable?

The solution is pretty reliable.

The initial setup is easy.

The stability is very good.

Technical support is pretty good.

What needs improvement?

I cant speak to any aspects that are lacking. We don't feel there are any missing features. 

You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.

For how long have I used the solution?

We've been dealing with the solution for three or four years at this point. it's been a while now. 

We do use full encryption at this point. Right now, this is just encrypting the hard drives. If you put any type of foreign device in, you have the option to, if you want, utilize it, however, you have to make the choice of encrypting it.

What do I think about the stability of the solution?

The solution offers good stability. There are no bugs or glitches. It doesn't crash or freeze. the performance is reliable. 

What do I think about the scalability of the solution?

I don't really have too many thoughts on scalability. I used to work with it to a certain point, and that was just initially trying to get it implemented and set up. After that, we realized that it's a full-time endeavour. When you mess with the endpoint, you might actually mess with the workstations. I'm not on the help desk or a part of the service team. I'm the network person. I don't get into the day-to-day of pushing updates or making sure that certain Blades were implemented on end user devices and stuff like that.

I'm not sure of the exact number of people on the solution at this time.

How are customer service and technical support?

Technical support is really good. They are quite reliable and responsive. We've been satisfied with the level of support they have provided.

How was the initial setup?

My understanding is that the initial setup is pretty straightforward. It's not complex. however, I didn't personally implement it. It's not a complex process.

What's my experience with pricing, setup cost, and licensing?

I don't handle the pricing or anything like that. I don't actually get involved in the pricing or licensing aspects of the product.

What other advice do I have?

We're just customers and end-users. We don't have a business relationship with Check Point. 

We likely use the most recent version of the solution, however, I cannot speak to the exact version number.

I'd rate the solution at a ten out of ten. It's a pretty robust product and we're satisfied with its capabilities.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Real User
Top 10
Superior Security, reliable, easy to use, and highly scalable
Pros and Cons
  • "They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
  • "The response time for technical support could be faster."

What is our primary use case?

We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints.

This solution is available as an enterprise bundle, which we use on all of our endpoints.

What is most valuable?

They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.

It has been proven to be completely effective with us. We haven't had anything related to threats pass through our system in the last five years.

It is easy to use. 

When a new version becomes available, it automatically updates. The update is seamless, regardless of the features you have, because some features will not apply to clinics depending on what we use. We don't have a pre-built screen.

Whether it is a laptop or a desktop, we can customize it so that it does not interfere with our operations.

We do not need to change our security because it is superior to that of the Department of Technology.

What needs improvement?

The response time for technical support could be faster.

For how long have I used the solution?

I have been working with Check Point Full Disk Encryption Software Blade for 10 years.

What do I think about the stability of the solution?

The stability of Check Point Full Disk Encryption Software Blade is very good.

What do I think about the scalability of the solution?

Check Point Full Disk Encryption Software Blade is highly scalable.

How are customer service and support?

The technical support is a little slow in responding, but they always come through.

How was the initial setup?

The initial setup only requires the use of a small executable. It works well.

What's my experience with pricing, setup cost, and licensing?

I definitely don't have any information regarding the price. I am not involved in the purchase, maintenance, or contract.

Which other solutions did I evaluate?

The company is considering FireEye. I am evaluating the pros and cons, as well as the differences and benefits of using that other endpoint solution.

I am trying to compare what we have with FireEye because that is supposed to be mandated by the state. FireEye does not have what we have in Check Point, and we are attempting to justify why we don't need to change our environment.

This is being considered because they want to provide reports for the state, which we can do by customizing the reports they request.

What other advice do I have?

We have not had any problems with this solution which includes devices that have been lost or stolen.

I would rate Check Point Full Disk Encryption Software Blade a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
Find out what your peers are saying about Check Point, Microsoft, WinMagic and others in Endpoint Encryption. Updated: January 2022.
563,148 professionals have used our research since 2012.
Head of the cyber defense operational unit at a government with 5,001-10,000 employees
Real User
Top 20
Provides 360-degree security on one's work station
Pros and Cons
  • "The solution provides complete security for one's workstation."
  • "While the solution works as it should, it is overly expensive."

What is our primary use case?

We are using the most up-to-date version, software blades 82 through 85. 

We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation. 

What is most valuable?

The solution provides complete security for one's workstation. 

What needs improvement?

While the solution works as it should, it is overly expensive. 

For how long have I used the solution?

We've been using Check Point Full Disk Encryption Software Blade for a couple of years.

What do I think about the stability of the solution?

We have had no issues with the stability. While we require a bit more of a processing unit, there is nothing to add in this regard. 

What do I think about the scalability of the solution?

In as much as the solution provides a view of what is happening on one's workstation, I would say it's really scalable. 

How are customer service and technical support?

We have the guidance we need when it comes to tech support. 

How was the initial setup?

The initial setup is pretty straightforward. One only need install a simple agent on the workstation and the management handles everything else on it, so installation is pretty straightforward. 

What's my experience with pricing, setup cost, and licensing?

The solution is overpriced. 

As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive. 

We are not talking about a licensing fee in respect of tech support. The way Check Point works is that one pays for a percentage of the technology that he has. Diamond support has a higher percentage than normal support. Essentially, the person is charged for a percentage of what he owns. 

What other advice do I have?

My advice is that a person use a centralized solution. Our attempts to use a local solution on a work station have been disasterous. Yet, the moment we got a centralized management solution, the deployment and management became really easy to do.

I rate Check Point Full Disk Encryption Software Blade as an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate