We use Check Point Full Disk Encryption Software Blade to protect our mobile devices. We do not use a lot of the functionality of the solution, we only use FDE.
Senior Manager Information Security at a outsourcing company with 51-200 employees
Effective hard disk protection and overall stable
Pros and Cons
- "The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
- "I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
What is our primary use case?
What is most valuable?
The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.
For how long have I used the solution?
I have been using Check Point Full Disk Encryption Software Blade for approximately more than eight years.
What do I think about the stability of the solution?
The overall stability of Check Point Full Disk Encryption Software Blade has been good. We have had some minor issues but we have not had an issue that needed major escalation.
Buyer's Guide
Check Point Full Disk Encryption Software Blade
November 2024
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
815,854 professionals have used our research since 2012.
What do I think about the scalability of the solution?
We have a small user base using Check Point Full Disk Encryption Software Blade.
How are customer service and support?
We have used the support. We have created support tickets. If needed I escalate the issue I have to our account manager.
I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten.
How would you rate customer service and support?
Neutral
What other advice do I have?
We have not had any problems with the maintenance of the solution.
I rate Check Point Full Disk Encryption Software Blade an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Cisco Secure Endpoint
Microsoft BitLocker
Symantec Endpoint Encryption
McAfee Complete Data Protection
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which full disk encryption software should we chose?
- What is the difference between "data protection in transit" vs "data protection at rest"?
- What is the best email encryption software for small enterprises using Office 365?
- When evaluating Endpoint Encryption, what aspect do you think is the most important to look for?
- What should one take into account when replacing PGP with Microsoft BitLocker?
- Why do organizations need endpoint encryption?
- What are the main pros and cons of the various Endpoint Encryption solutions on the market?
- How can I tell if there is encryption on?
- What is the best endpoint encryption system?
- Why is Endpoint Encryption important for companies?