Try our new research platform with insights from 80,000+ expert users
Jonathan Ramos G. - PeerSpot reviewer
Cloud Engineer at ITQS
Real User
Top 5Leaderboard
Good device encryption, maximizes operational efficiency, and has forensic analysis capacity
Pros and Cons
  • "It helps us maximize the operational efficiency and performance of our activities."
  • "I would like to bring centralized management to mobile devices."

What is our primary use case?

We required a solution that could support us in centrally locking down removable storage media such as USB flash drives, DVDs, or removable hard drives for maximum protection. 

This is so that users cannot, due to an error or carelessness, connect an infected device that compromises the services or operations of my organization. 

Above all, having all the activities centralized helps in notifying any activity, depending on the machine, port, and type of allocation, which may be violated. This is where we find a blocking and encryption solution at Check Point.

How has it helped my organization?

It helps us maximize the operational efficiency and performance of our activities, such as fast scanning times, and, on a periodic basis, with little memory use, so that our equipment does not become slow where we apply centralized policies. It has a forensic analysis capacity. Above all, the possibility of keeping our data safe by placing a unique digital signature for each device that we will encrypt, informing us of any unauthorized changes.

What is most valuable?

Above all, the most useful aspect is the possibility of keeping our data safe by placing a unique digital signature for each device we will encrypt. It's informing us of any unauthorized changes. It is one of the most valuable features. Still, we cannot forget that Check Point offers us the User Check portal to involve and be able to give good active training to our users. They access portable media to be able to identify possible incidents. Above all, the possibility of seeing everything from a centralized portal is quite useful. 

What needs improvement?

I would like to bring centralized management to mobile devices. I would like Check Point to surprise us with these features in the future, being one of the best and most valued. It would be great if they supported us and reached the possibilities of portability to became more practical and functional with the new technologies. This possibility of new features helps us innovate and be more proactive in technological innovation. 

Buyer's Guide
Check Point Full Disk Encryption Software Blade
November 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1468713 - PeerSpot reviewer
Head of the cyber defense operational unit at a government with 5,001-10,000 employees
Real User
Provides 360-degree security on one's work station
Pros and Cons
  • "The solution provides complete security for one's workstation."
  • "While the solution works as it should, it is overly expensive."

What is our primary use case?

We are using the most up-to-date version, software blades 82 through 85. 

We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation. 

What is most valuable?

The solution provides complete security for one's workstation. 

What needs improvement?

While the solution works as it should, it is overly expensive. 

For how long have I used the solution?

We've been using Check Point Full Disk Encryption Software Blade for a couple of years.

What do I think about the stability of the solution?

We have had no issues with the stability. While we require a bit more of a processing unit, there is nothing to add in this regard. 

What do I think about the scalability of the solution?

In as much as the solution provides a view of what is happening on one's workstation, I would say it's really scalable. 

How are customer service and technical support?

We have the guidance we need when it comes to tech support. 

How was the initial setup?

The initial setup is pretty straightforward. One only need install a simple agent on the workstation and the management handles everything else on it, so installation is pretty straightforward. 

What's my experience with pricing, setup cost, and licensing?

The solution is overpriced. 

As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive. 

We are not talking about a licensing fee in respect of tech support. The way Check Point works is that one pays for a percentage of the technology that he has. Diamond support has a higher percentage than normal support. Essentially, the person is charged for a percentage of what he owns. 

What other advice do I have?

My advice is that a person use a centralized solution. Our attempts to use a local solution on a work station have been disasterous. Yet, the moment we got a centralized management solution, the deployment and management became really easy to do.

I rate Check Point Full Disk Encryption Software Blade as an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Check Point Full Disk Encryption Software Blade
November 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
Cloud Support at a tech company with 1-10 employees
User
Top 5Leaderboard
A great feature of disk encryption, available in MGMT.
Pros and Cons
  • "We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
  • "Regarding the general topic of support, many have annoyances with it."

What is our primary use case?

 However, this blade is very good both on paper and in the testing.

The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company.

We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers.

It can be implemented easily with Harmony Endpoint.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade helped us to have a solid solution with centralized management and control through its endpoint management.

It's ideal as an operating agent at the endpoint. We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.

Additionally, its remote management allows us to determine what to protect or what not is quite good. It is easy to execute and helped us a lot with the management in the company.

What is most valuable?

One of the most interesting functions that Check Point Full Disk Encryption Software Blade is that it can make it easy for massive implementation through the centralized administration portal where we can remotely take control of the protected units as well as offline.

This feature, in addition to encrypting, provides protection to prevent. If a device is lost, the information it contains cannot be deciphered. In our company, this functionality was promoted by the Check Point vendor according to our needs and the capabilities it provides.

It's an easy implementation with plenty of guide information.

What needs improvement?

The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow.

Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work.

Although they are excellent, they should improve their small problems to try to improve.

For how long have I used the solution?

We've used this software for some time to centralize our Check Point security devices. This blade is very effective through the centralized portal.

Which solution did I use previously and why did I switch?

Previously, we used the Microsoft tool. However, we already use Check Point as security tools.

What's my experience with pricing, setup cost, and licensing?

Generally, the costs of Check Point tools are not public, which is why you need a good partner who can provide you with the help that one requires as a client.

Which other solutions did I evaluate?

 We chose this product thanks to our partner - who had the right knowledge to help us make the decision to acquire this tool.

Other options were looked at, however, we like the manufacturer and its characteristics match what we need.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Support at a security firm with 51-200 employees
User
Top 5Leaderboard
Good endpoint security that prevents data leaks but needs better documentation
Pros and Cons
  • "End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
  • "The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."

What is our primary use case?

The tool provides security to the information found on user endpoint devices to prevent information from leaking outside the company. With this tool, we were able to do what was required to be able to provide this very important layer of security. 

How has it helped my organization?

It provides security for the information found on user endpoint devices to prevent information from leaking outside the company. With this tool, we were able to provide a very important layer of security. 

We have encrypted the data hard drives of the equipment and have been able to do it remotely from the centralized console.

What is most valuable?

The best features of Full Disk Encryption include:

  • End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system.
  • Pre-boot authentication is used to ensure that only authorized users can access the device and its encrypted data. building trust among users who use the product efficiently.
  • Centralized management.
  • Safe recovery.

What needs improvement?

The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.

The solution is always a blade, yet it must be purchased separately so that it can be integrated into the solution.

The documentation is sometimes from older devices, which is not all the same when implementing. They should replace the documentation with the most modern.                           

For how long have I used the solution?

We used this tool for a while to be able to control the encryption of the disks and devices that will be in use in our business devices.

Which solution did I use previously and why did I switch?

We had previously used the Windows solution. However, its implementation was not centralized or remote.

Which other solutions did I evaluate?

It is always important to test this type of solution before implementing it in production, as well as to validate execution times to make the best decision for the company.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2000274 - PeerSpot reviewer
Software Engineer at CloudSense
User
Top 5
Great data encryption, efficient support, and customizable storage
Pros and Cons
  • "Encryption prevents data loss which can cost the organization a lot of resources."
  • "The price is high for small scale business enterprises."

What is our primary use case?

The entire organization's workloads are secure under this platform. Check Point Full Disk Encryption Software Blade secures the company information saved in hard drives. 

Data encryption enhances file safety and secures team collaboration. 

This platform automatically encrypts all information on the hard disks for effective safety. It blocks affected files that may contain viruses to stop spreading. Data saved is kept under classified folders for easy retrieval. The security blade has saved confidential information from leaking into unsafe environments.

How has it helped my organization?

File and document management has been excellent since we implemented this platform. 

This tool gas large customizable storage spaces that can control a large volume of data. Data security and cloud storage infrastructure have been working effectively from powerful security models. Running workflows in safe environments have improved employee experience and orchestrated our file storage norms. 

This product has digitized our storage services and eliminated manual storage programs. I am impressed by the current performance, and I recommend this tool to others.

What is most valuable?

The security features safeguard our files from ransomware attacks. 

This tool has enabled us to set file management policies that can be observed to enhance efficient data management. 

Encryption prevents data loss which can cost the organization a lot of resources. 

The pricing and licensing terms are flexible and easy to maintain. The customer support staff is dedicated to offering timely services and providing solutions to any request. 

It is easy to use the UI and interact with the data management dashboards.

What needs improvement?

I have experienced great improvement in the management of files and security. The capabilities of all the features have been reliable since we deployed this platform. The price is high for small-scale business enterprises. The vendor team should invest more resources in training customers for the effective use of this tool. There is a need for automated backup that is always on standby to ensure there is no loss of data when upgrading our hard drives. Most storage and security services that we have received have been effective.

For how long have I used the solution?

I've used the solution for seven months. 

What do I think about the stability of the solution?

Security and data storage services are excellent.

What do I think about the scalability of the solution?

I am impressed by the great performance of this tool.

How are customer service and support?

The customer support services are efficient.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not used similar data storage.

How was the initial setup?

The setup was straightforward.

What about the implementation team?

The implementation took place through the vendor.

What was our ROI?

There is a positive ROI from the overall performance.

What's my experience with pricing, setup cost, and licensing?

The licensing terms are efficient.

Which other solutions did I evaluate?

I have not evaluated other options.

What other advice do I have?

For data storage and safety, this is the best solution.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Security IT at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Full Disk Encryption - Excellent centralized environment
Pros and Cons
  • "This encryption is relatively fast and really covers the needs required."
  • "The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."

What is our primary use case?

Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained.

We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information.

Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements.

This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.

How has it helped my organization?

Check Point Full Disk Encryption Software Blade gave us the opportunity to manage encryption on laptops that were carried out of the office, giving us the security of drive encryption and implementation through the management portal.

This encryption is quite fast and really covers the required needs.

The encryption algorithms are quite secure such as AES 256 in addition to the alerts that can be implemented to have the entire environment with a greater degree of control and administration.

What is most valuable?

For the company, the great characteristic of this tool is its centralized environment which offers the management of the tool from Check Point Security Management.

On the other hand, the implementation of self-management policies on devices is quite easy to implement, generating speed.

The algorithms implemented by Check Point Full Disk Encryption Software Blade are very secure, and this generates a lot of confidence in the tool.

Finally, this tool can be implemented in an existing Check Point gateway environment to keep everything in one place.

What needs improvement?

Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered.

As for the dashboard, I think it could be renewed to be more attractive to users.

As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.

For how long have I used the solution?

We used this tool for several years now with pretty good results.

Which solution did I use previously and why did I switch?

Previously we used Windows Disk Encryption Management, however, it was not to our liking or as robust as we wanted.

What's my experience with pricing, setup cost, and licensing?

My advice is to always validate the scope of the solutions in addition to the costs to see if the tool is required.

Which other solutions did I evaluate?

We always evaluate options to determine which is the best. This option provided by Check Point seems to be what we required.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1601424 - PeerSpot reviewer
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Real User
Superior Security, reliable, easy to use, and highly scalable
Pros and Cons
  • "They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."
  • "The response time for technical support could be faster."

What is our primary use case?

We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints.

This solution is available as an enterprise bundle, which we use on all of our endpoints.

What is most valuable?

They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.

It has been proven to be completely effective with us. We haven't had anything related to threats pass through our system in the last five years.

It is easy to use. 

When a new version becomes available, it automatically updates. The update is seamless, regardless of the features you have, because some features will not apply to clinics depending on what we use. We don't have a pre-built screen.

Whether it is a laptop or a desktop, we can customize it so that it does not interfere with our operations.

We do not need to change our security because it is superior to that of the Department of Technology.

What needs improvement?

The response time for technical support could be faster.

For how long have I used the solution?

I have been working with Check Point Full Disk Encryption Software Blade for 10 years.

What do I think about the stability of the solution?

The stability of Check Point Full Disk Encryption Software Blade is very good.

What do I think about the scalability of the solution?

Check Point Full Disk Encryption Software Blade is highly scalable.

How are customer service and support?

The technical support is a little slow in responding, but they always come through.

How was the initial setup?

The initial setup only requires the use of a small executable. It works well.

What's my experience with pricing, setup cost, and licensing?

I definitely don't have any information regarding the price. I am not involved in the purchase, maintenance, or contract.

Which other solutions did I evaluate?

The company is considering FireEye. I am evaluating the pros and cons, as well as the differences and benefits of using that other endpoint solution.

I am trying to compare what we have with FireEye because that is supposed to be mandated by the state. FireEye does not have what we have in Check Point, and we are attempting to justify why we don't need to change our environment.

This is being considered because they want to provide reports for the state, which we can do by customizing the reports they request.

What other advice do I have?

We have not had any problems with this solution which includes devices that have been lost or stolen.

I would rate Check Point Full Disk Encryption Software Blade a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1616445 - PeerSpot reviewer
Security And Network Administrator at a comms service provider with 501-1,000 employees
Real User
Easy to set up and stable with good technical support
Pros and Cons
  • "The initial setup is easy."
  • "You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."

What is our primary use case?

The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.

What is most valuable?

The solution is pretty reliable.

The initial setup is easy.

The stability is very good.

Technical support is pretty good.

What needs improvement?

I cant speak to any aspects that are lacking. We don't feel there are any missing features. 

You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.

For how long have I used the solution?

We've been dealing with the solution for three or four years at this point. it's been a while now. 

We do use full encryption at this point. Right now, this is just encrypting the hard drives. If you put any type of foreign device in, you have the option to, if you want, utilize it, however, you have to make the choice of encrypting it.

What do I think about the stability of the solution?

The solution offers good stability. There are no bugs or glitches. It doesn't crash or freeze. the performance is reliable. 

What do I think about the scalability of the solution?

I don't really have too many thoughts on scalability. I used to work with it to a certain point, and that was just initially trying to get it implemented and set up. After that, we realized that it's a full-time endeavour. When you mess with the endpoint, you might actually mess with the workstations. I'm not on the help desk or a part of the service team. I'm the network person. I don't get into the day-to-day of pushing updates or making sure that certain Blades were implemented on end user devices and stuff like that.

I'm not sure of the exact number of people on the solution at this time.

How are customer service and technical support?

Technical support is really good. They are quite reliable and responsive. We've been satisfied with the level of support they have provided.

How was the initial setup?

My understanding is that the initial setup is pretty straightforward. It's not complex. however, I didn't personally implement it. It's not a complex process.

What's my experience with pricing, setup cost, and licensing?

I don't handle the pricing or anything like that. I don't actually get involved in the pricing or licensing aspects of the product.

What other advice do I have?

We're just customers and end-users. We don't have a business relationship with Check Point. 

We likely use the most recent version of the solution, however, I cannot speak to the exact version number.

I'd rate the solution at a ten out of ten. It's a pretty robust product and we're satisfied with its capabilities.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros sharing their opinions.