Try our new research platform with insights from 80,000+ expert users

Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
17
Ranking in other categories
Endpoint Encryption (7th), Mobile Data Protection (3rd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
48
Ranking in other categories
Endpoint Protection Platform (EPP) (13th), Endpoint Detection and Response (EDR) (12th), Cisco Security Portfolio (5th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 1.5%, down 1.7% compared to last year.
Cisco Secure Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.6% mindshare, down 1.9% since last year.
Endpoint Encryption
Endpoint Protection Platform (EPP)
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
AKSHAYK - PeerSpot reviewer
Identifies the malicious content in an organization's network
We must install an agent on every laptop. We do not know how to do it for the network. We shouldn’t have to install agents individually if it's a corporate network. The product does not provide options like tunnel creation or virtual appliances. If there are 2000 users and only one network administrator, installing the agent on every laptop will be time-consuming.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This software has helped individuals in the organization avoid data loss."
"It's easily scalable and adaptable to the needs of the business."
"This encryption is relatively fast and really covers the needs required."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"Encryption prevents data loss which can cost the organization a lot of resources."
"It is a cross-platform tool."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"The product's initial setup phase is totally fine."
"It used to take us a month to find out that something is infected, we now know that same day, as soon it is infected."
"The best feature that we found most valuable, is actually the security product for the endpoint, formerly known as AMP. It has behavioral analytics, so you can be more proactive toward zero-day threats. I found that quite good."
"The most valuable feature at this moment is that Cisco AMP or Cisco Secure Endpoint solution is delivering a lot of things, and I always say to a lot of customers that if we didn't have Cisco AMP, we probably would have had ransomware somewhere. So, it's protecting us very well from a lot of hackers, malware, and especially ransomware."
"The product provides sandboxing options like file reputation and file analysis."
"It provides real-time visibility and control over endpoints, allowing its users to promptly respond to any security incidents and remediate any vulnerabilities."
"It is extensive in terms of providing visibility and insights into threats. It allows for research into a threat, and you can chart your progress on how you're resolving it."
"The most valuable feature of the solution is its technical support."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
 

Cons

"The tool is too expensive to be an add-on to the main solution. They could launch it independently so that costs can be lowered."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"Regarding the general topic of support, many have annoyances with it."
"I would like to bring centralized management to mobile devices."
"There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."
"The cost of maintaining the system is high for personal use."
"Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."
"It could be improved in connection with artificial intelligence and IoT."
"The user interface is dull."
"Its price is okay for us, but it can always be better. There's always room for improvement when it comes to pricing."
"It is an expensive solution."
"It cannot currently block URLs over websites."
"One of the things that Cisco Secure Endpoint really needs is that it's not just Secure Endpoint, it's a point product, and I think we really need to move into solution-based selling, designing, and architecting. So that we're not worried about putting things on endpoints and selling 'x' amount of endpoints, but to provide a solution that covers all of the remote access and sell them as solutions that cover multiple things."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"We had faced some license issues, but it has been improved. At the beginning of the implementation, we faced a lot of licensing issues, but now, we have EA licensing, which gives us an opportunity to grow."
"I rate the pricing a five or six on a scale of one to ten, where one is expensive, and ten is cheap."
"It can always be cheaper."
"...the licensing needs to be improved. All the product features we need are there. It's just a matter of the complexity and the different offerings and trying to figure things out."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"The costs of 50 licenses of AMP for three years is around $9,360."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
823,875 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Security Firm
19%
Computer Software Company
19%
Financial Services Firm
8%
Legal Firm
5%
Computer Software Company
17%
Government
9%
Financial Services Firm
8%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Check Point Full Disk Encryption Software Blade?
The cost of licenses depends on the characteristics or implementation you are looking for.
What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
I am not entirely sure about the exact licensing cost. It ranges from 2,000 to 2,500 INR annually.
What needs improvement with Cisco Secure Endpoint?
Previously, there were options to uninstall the agent without a password if you had admin access, and this could be improved. It may require a password for uninstalling clients, which would be help...
 

Also Known As

No data available
Cisco AMP for Endpoints
 

Learn More

 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: December 2024.
823,875 professionals have used our research since 2012.