Try our new research platform with insights from 80,000+ expert users

Check Point Capsule Software [EOL] vs Microsoft BitLocker comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Capsule Softwar...
Average Rating
8.6
Reviews Sentiment
7.7
Number of Reviews
4
Ranking in other categories
No ranking in other categories
Microsoft BitLocker
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
66
Ranking in other categories
Endpoint Encryption (1st), Mobile Data Protection (1st)
 

Featured Reviews

William Cambronero - PeerSpot reviewer
Easy to set up with helpful antivirus and firewall capabilities
There are some general areas and features that could be improved in the next version of the Check Point Capsule software. Cloud security could add more advanced features for apps and services. Mobile device management would improve the administration and make it more flexible and dynamic. They need to improve integration with cloud SIEMS. Finally, they must improve the technical support process. When requesting it for a specific case, they do not coordinate a call in a good amount of time. They must also improve the SLA and the escalation of engineers
Ibrahin Gamal - PeerSpot reviewer
Data protection improves while users adapt to user access complexities
Recovery options are useful with Microsoft BitLocker. When we get the recovery key from Microsoft, people who we show how BitLocker works did not know the facts about BitLocker. When we tell them about recovery keys, it is very difficult for them to get to the users who have issues in their PCs and do not have the knowledge. When IT asked about the scenario, it was difficult for them. They needed something where they could go to the administration portal to unlock the PC for the user, but we tell them that when a user asks for a recovery key, it consists of 32 numbers to unlock their PC. They observed cost savings after implementing Microsoft BitLocker because they requested BitLocker with System Center. They found that it did not have a high cost, as it is a built-in feature in Windows. When they asked about other solutions, it was very expensive for large numbers in other corporates or organizations. They were very satisfied with Microsoft BitLocker with System Center Configuration Manager.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The antivirus is great since it helps us with the real-time protection of all devices."
"It is very simple to install and use."
"We're taking advantage of the computing power that the cloud has made."
"Check Point Capsule can use SSO so that we can use a single identity for all our users and tasks in the organization."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"The solution works the way it's supposed to - stability and scalability are fine."
"We have not seen any bugs or glitches, so the stability is good."
"One significant aspect is that without the BitLocker key, you can't log in to the user's laptop. I appreciate the capability to encrypt the user's hard drive, ensuring access only with the recovery key. In an enterprise setup, we store all BitLocker keys on our server. So, whenever a user attempts to log in, the architecture authenticates with the key. This ensures that our data is secure. Even if the user's laptop is lost, we have confidence that the data remains inaccessible. So far, our user data is well-protected."
"It comes bundled with other Microsoft solutions."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The most important aspect of this solution is that if your laptop gets stolen, the information is encrypted."
"Microsoft BitLocker can be used to ensure that stolen PCs or laptops do not lose their data."
 

Cons

"Among the features that I would have liked to see in its beginnings and in use of the solution is the ability to integrate real-time analysis and emulation of the activities that a user has when being attacked."
"There should be more clarity when it comes to licensing because it is difficult to understand."
"Cloud security could add more advanced features for apps and services."
"Check Point has already been making several changes to Check Point Capsule and has transformed it into Check Point Harmony."
"The people at the first level of support refer you to articles that do not pertain to the problem at hand."
"The solution could improve by having a centralized GUI for management."
"They can improve the security of the application and include an encryption disk in the next feature."
"If the encryption was faster then it would make the experience more pleasant."
"More detailed documentation about usage would be beneficial, as installation instructions are provided but potential issues are not typically addressed."
"The solution should have a better user interface and dashboard."
"The integration between Active Directory and BitLocker could be better."
"The pricing should be improved."
 

Pricing and Cost Advice

"The costs and licensing methods are not clear to me also because we purchased a maxi package that already included the option of using this product."
"It is free. It is enabled as part of the operating system. Once you have an operating system license, you're licensed for Bitlocker."
"It operates on a subscription model on an annual basis."
"The product's cost is included in Windows."
"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"The solution’s pricing is reasonable."
"The solution is expensive."
"Microsoft BitLocker's pricing is included in the Microsoft license, and you don't have to pay an additional fee for it."
"BitLocker is already in Windows 10 and its price has already been "paid"."
report
Use our free recommendation engine to learn which Mobile Data Protection solutions are best for your needs.
872,837 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Government
10%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise2
By reviewers
Company SizeCount
Small Business35
Midsize Enterprise10
Large Enterprise25
 

Questions from the Community

Ask a question
Earn 20 points
What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
 

Also Known As

No data available
BitLocker, MS BitLocker
 

Overview

 

Sample Customers

Ultima Business Solutions, Terma
ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Find out what your peers are saying about Microsoft, Sophos, Trend Micro and others in Mobile Data Protection. Updated: October 2025.
872,837 professionals have used our research since 2012.