Symantec Endpoint Encryption and Check Point Full Disk Encryption Software Blade compete in the full disk encryption category. While Symantec is noted for its feature-rich integration with enterprise solutions, Check Point is favored for its hard disk protection and management efficiency.
Features: Symantec Endpoint Encryption stands out with its robust asset identification and antivirus integration, appealing to large enterprises as an all-in-one solution. Its cloud features enhance user security seamlessly. In contrast, Check Point Full Disk Encryption excels in centralized management, pre-boot authentication, and non-intrusive encryption, adding a strategic layer of protection against unauthorized access.
Room for Improvement: Symantec could benefit from broader product integration and more responsive technical support. Users also mention the complexity of installation and administration in on-premises settings. For Check Point, users seek better decryption performance and enhanced documentation. The cost can be prohibitive, suggesting a need for more affordable solutions.
Ease of Deployment and Customer Service: Symantec is often deployed on-premises with hybrid cloud options, though its technical support has varying reviews concerning responsiveness. Check Point offers private cloud and on-premises deployments with reliable customer service, though quick response times are occasionally lacking. Its centralized deployment is appreciated in large IT environments.
Pricing and ROI: Symantec's competitive pricing is acknowledged by large enterprises, despite perceptions of higher costs due to bundled licensing. It offers substantial ROI through enhanced productivity. Check Point is seen as expensive with a complex pricing structure, affecting its appeal to smaller budgets despite effective data protection and security offerings.
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.