What is our primary use case?
This tool provides full-featured security to our hard drives, and any other user files stored.
Viruses can corrupt stored information and delete user data without the user's knowledge. The authentication marks prevent unauthorized users from accessing confidential information without user consent.
We had to look for a platform like this after increased cases of data mismanagement from our staff members.
Setting up personal passwords for accessing saved files is easy. The set encryption models prevent data loss from malware attacks.
How has it helped my organization?
This software has helped individuals in the organization avoid data loss. It secures private information from leaking to the public and unauthorized parties.
It fully encrypts all the files stored in the hard drive to prevent any form of cyber attack.
It blocks harmful content that can destroy stored files.
Check Point Full Disk Encryption Software Blade allows the user to partition and label hard drives on various disks.
Data protection has been the main goal, and this platform has fully helped us in working with safe products.
What is most valuable?
Automatic data encryption protects stored files from landing in the hands of unauthorized members.
When we save our virtual meeting videos and other files there is a security guarantee, and no one can interfere with the confidential information.
It helps back up files and keeps them safe until they are needed for reference.
The virus protection models prevent the disk from transmitting viruses when sharing files among colleagues.
Classifying folders and allocating space to various programs saves time when retrieving data.
What needs improvement?
I am familiar with set features, and the performance of this product is highly powerful.
The cost of maintaining the system is high for personal use.
Partitioning and setting up passwords is complicated for new users.
There is no low-volume storage package for small business enterprises.
We have benefited from this product since we deployed it and have enjoyed its flexible features and high-performance capability. The variety of blades gives the users full data access control.
I am impressed by the feature set's performance, and I totally recommend it to other companies.
For how long have I used the solution?
I've used the solution for nine months.
What do I think about the stability of the solution?
It is stable. It has offered the best services.
What do I think about the scalability of the solution?
Data encryption and hard disk protection services have impressed all the teams.
How are customer service and support?
The customer service team is always ready to act when we reach out.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have had no engagement with other vendors.
How was the initial setup?
The setup was complex due to limited knowledge of how to work this tool effectively.
What about the implementation team?
We did an in-house implementation.
What was our ROI?
There is a positive ROI due to effective data prevention of unauthorized attacks.
What's my experience with pricing, setup cost, and licensing?
The setup cost depends on the company's preferences.
Which other solutions did I evaluate?
We evaluated several products. However, this solution was more scalable.
What other advice do I have?
The planned objectives have been achieved.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: I am a real user, and this review is based on my own experience and opinions.