Due to the fact that many users travel remotely from home or travel to different places in the country with the devices, a tool was needed that would provide us with the security and tranquility that the information would be safe on the devices that our users would access. This tool was acquired that gives us this disk encryption function, and with this, we can have better security in case said devices are stolen or lost and the information is safe at all times and in all places.
This is a disk encryption and filtering solution. Check Point provides us with full decryption software that has allowed us to protect critical company data on desktop and laptop computers. Check Point Full Disk Encryption Software Blade helps us ensure that critical data is protected at all times, even in case of loss or theft of equipment. Additionally, by complying with data privacy regulations, the company avoids potential penalties and damage to our corporate reputation.
This product provides data storage capabilities for both mobile and desktop devices. Data encryption enhances data safety and blocks breaches from cyber attackers. Check Point Full Disk Encryption Software Blade has a secure data backup that ensures we don't lose any information during disk upgrades. The software blade provides comprehensive security coverage and shields files stored in the disk from leaking. It supports various operating systems that we have installed with most computing devices.
Cloud Engineer at IT Quest Solutions|interglobalmsp
User
Top 5
2022-12-29T03:38:00Z
Dec 29, 2022
Check Point Full Disk Encryption Software is a tool that came to complete the security of the devices since this tool encrypts all the disks, ensuring all the information is safe, and thus, no third party can access the information if the device is stolen. In addition, viruses cannot enter and eliminate the information stored on the disks. It helped us to configure passwords to the files and thus be able to improve the security of sensitive folders.
This tool provides full-featured security to our hard drives, and any other user files stored. Viruses can corrupt stored information and delete user data without the user's knowledge. The authentication marks prevent unauthorized users from accessing confidential information without user consent. We had to look for a platform like this after increased cases of data mismanagement from our staff members. Setting up personal passwords for accessing saved files is easy. The set encryption models prevent data loss from malware attacks.
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Senior Manager Information Security at a outsourcing company with 51-200 employees
Real User
2022-10-21T09:44:47Z
Oct 21, 2022
We use Check Point Full Disk Encryption Software Blade to protect our mobile devices. We do not use a lot of the functionality of the solution, we only use FDE.
Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained. We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information. Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements. This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.
We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers. However, this blade is very good both on paper and in the testing. The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company. It can be implemented easily with Harmony Endpoint.
In the organization, over a couple of years, various types of security and software solutions had been implemented, and we needed something for the data media recorder, such as USB hard drives, among others. We did some research on Check Point. We found it provided us with the functionalities that we needed to provide security for the data of the company and our employees. One of the important characteristics we found was that the agent that performs the recording functions does not consume as many resources as others do.
Cloud Support at a tech company with 51-200 employees
User
2022-06-03T15:25:00Z
Jun 3, 2022
The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of any type of data medium, DVS, hard drive, and USB, among others. It's an important feature to prevent the theft of user information. It provides security for the company's data in addition to the other security services we have. We love the encryption it automatically provides and its work agent uses almost no computer resources, an excellent hardware protection tool.
Field Services IT Desktop Support Supervisor at a government with 5,001-10,000 employees
Real User
2021-10-19T18:20:51Z
Oct 19, 2021
We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints. This solution is available as an enterprise bundle, which we use on all of our endpoints.
Head of the cyber defense operational unit at a government with 5,001-10,000 employees
Real User
2021-08-19T21:26:28Z
Aug 19, 2021
We are using the most up-to-date version, software blades 82 through 85. We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation.
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.Learn more about Full disk encryption.
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
Due to the fact that many users travel remotely from home or travel to different places in the country with the devices, a tool was needed that would provide us with the security and tranquility that the information would be safe on the devices that our users would access. This tool was acquired that gives us this disk encryption function, and with this, we can have better security in case said devices are stolen or lost and the information is safe at all times and in all places.
This is a disk encryption and filtering solution. Check Point provides us with full decryption software that has allowed us to protect critical company data on desktop and laptop computers. Check Point Full Disk Encryption Software Blade helps us ensure that critical data is protected at all times, even in case of loss or theft of equipment. Additionally, by complying with data privacy regulations, the company avoids potential penalties and damage to our corporate reputation.
This product provides data storage capabilities for both mobile and desktop devices. Data encryption enhances data safety and blocks breaches from cyber attackers. Check Point Full Disk Encryption Software Blade has a secure data backup that ensures we don't lose any information during disk upgrades. The software blade provides comprehensive security coverage and shields files stored in the disk from leaking. It supports various operating systems that we have installed with most computing devices.
Check Point Full Disk Encryption Software is a tool that came to complete the security of the devices since this tool encrypts all the disks, ensuring all the information is safe, and thus, no third party can access the information if the device is stolen. In addition, viruses cannot enter and eliminate the information stored on the disks. It helped us to configure passwords to the files and thus be able to improve the security of sensitive folders.
This tool provides full-featured security to our hard drives, and any other user files stored. Viruses can corrupt stored information and delete user data without the user's knowledge. The authentication marks prevent unauthorized users from accessing confidential information without user consent. We had to look for a platform like this after increased cases of data mismanagement from our staff members. Setting up personal passwords for accessing saved files is easy. The set encryption models prevent data loss from malware attacks.
We use Check Point Full Disk Encryption Software Blade to protect our mobile devices. We do not use a lot of the functionality of the solution, we only use FDE.
Our company has departments that are quite mobile, such as the IT and sales departments. They need to take their equipment everywhere. Given this condition, it was necessary to reinforce the security of these devices in order to protect the information they contained. We required a solution that in an agile and centralized way could provide encryption in the units of the equipment in order to avoid loss or theft of the devices and the exposure of business information. Thanks to Check Point's support, we were able to find a solution that could be used in our main environment and could provide and meet these requirements. This is another solution used by our GW. Check Point's management environments, through the blades are incorporated into the main solution.
We get good functioning from the Check Point tool in order to perform encryption and protection of storage devices, disks, and drives, among others. We look for functionality in several manufacturers. However, this blade is very good both on paper and in the testing. The tool has helped us improve the security of business data. With this tool and through its easy-to-implement agent, the desired unit is encrypted in order to avoid losing critical information in the company. It can be implemented easily with Harmony Endpoint.
In the organization, over a couple of years, various types of security and software solutions had been implemented, and we needed something for the data media recorder, such as USB hard drives, among others. We did some research on Check Point. We found it provided us with the functionalities that we needed to provide security for the data of the company and our employees. One of the important characteristics we found was that the agent that performs the recording functions does not consume as many resources as others do.
The Check Point Media Encryption Software Blade provides centrally-enforceable encryption of any type of data medium, DVS, hard drive, and USB, among others. It's an important feature to prevent the theft of user information. It provides security for the company's data in addition to the other security services we have. We love the encryption it automatically provides and its work agent uses almost no computer resources, an excellent hardware protection tool.
We use Check Point Full Disk Encryption Software Blade as anti-virus and anti-malware protection on our endpoints. This solution is available as an enterprise bundle, which we use on all of our endpoints.
We are using the most up-to-date version, software blades 82 through 85. We use the solution for endpoint encryption and it handles everything. There's security, a firewall within the workstation and DLP within the solution and on the workstation. It makes use of 360-degree security on one's workstation.
The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.