I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are consumed; they should improve the audit area of the tool and make it more It is also efficient to add some type of remote access functionality for data recovery or integration with policy management tools. They must improve support and customer service, which is one of the factors where they have been failing the most in recent years.
The tool should be able to recover data from a stolen device. They need to include data recovery options that allow us to recover important information safely and effectively. It's a little complex. You need a little knowledge. Additionally, it becomes complex when you need an immediate response for data recovery due to business issues or any other need.
When using a single-factor authentication process to protect data from cyber-attacks, it can be prone to attackers who can guess the domain password and access confidential information. The deployment process is simple when there are existing Check Point products in use. The free trial enables users to make a comprehensive decision before making a purchase decision. There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.
I am familiar with set features, and the performance of this product is highly powerful. The cost of maintaining the system is high for personal use. Partitioning and setting up passwords is complicated for new users. There is no low-volume storage package for small business enterprises. We have benefited from this product since we deployed it and have enjoyed its flexible features and high-performance capability. The variety of blades gives the users full data access control. I am impressed by the feature set's performance, and I totally recommend it to other companies.
In the future, I would like to see is the ability to decrypt equipment. When we have disasters and recover equipment, we need simpler processes. Today, the encrypted equipment recovery is a bit complex. We need a faster, simpler, and less complex solution and strategy for equipment recovery when they have failed so that administrators can recover that data more efficiently. In many cases, that information that is encrypted and has had an accident entails a lot of recovery effort and in some cases, it cannot be recovered reliably and quickly.
Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered. As for the dashboard, I think it could be renewed to be more attractive to users. As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.
The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow. Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work. Although they are excellent, they should improve their small problems to try to improve.
They could improve the latency in the platform when entering the portal. They need to improve the time the first encryption takes. It affects the performance time a little too much. I've had negative experiences when it comes to receiving support. The response time is very slow and sometimes the agent changes and you have to explain everything again. In general, however, everything meets the needs very well. They should improve the encryption time on the units at the time of making a recovery of x unit.
Cloud Support at a tech company with 51-200 employees
User
2022-06-03T15:25:00Z
Jun 3, 2022
They could improve a bit on the encryption time of the units. They take a little time to recover. On the other hand, encryption also takes a little extra when it is completed for the first time. These are some details that can affect the performance of the technology implemented through the blade. It is important to improve the way they provide support. It is not bad, however, sometimes it takes a long time to coordinate sessions.
Security And Network Administrator at a comms service provider with 501-1,000 employees
Real User
2021-07-01T18:07:19Z
Jul 1, 2021
I cant speak to any aspects that are lacking. We don't feel there are any missing features. You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.
The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.Learn more about Full disk encryption.
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are consumed; they should improve the audit area of the tool and make it more It is also efficient to add some type of remote access functionality for data recovery or integration with policy management tools. They must improve support and customer service, which is one of the factors where they have been failing the most in recent years.
The tool should be able to recover data from a stolen device. They need to include data recovery options that allow us to recover important information safely and effectively. It's a little complex. You need a little knowledge. Additionally, it becomes complex when you need an immediate response for data recovery due to business issues or any other need.
When using a single-factor authentication process to protect data from cyber-attacks, it can be prone to attackers who can guess the domain password and access confidential information. The deployment process is simple when there are existing Check Point products in use. The free trial enables users to make a comprehensive decision before making a purchase decision. There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices.
I am familiar with set features, and the performance of this product is highly powerful. The cost of maintaining the system is high for personal use. Partitioning and setting up passwords is complicated for new users. There is no low-volume storage package for small business enterprises. We have benefited from this product since we deployed it and have enjoyed its flexible features and high-performance capability. The variety of blades gives the users full data access control. I am impressed by the feature set's performance, and I totally recommend it to other companies.
In the future, I would like to see is the ability to decrypt equipment. When we have disasters and recover equipment, we need simpler processes. Today, the encrypted equipment recovery is a bit complex. We need a faster, simpler, and less complex solution and strategy for equipment recovery when they have failed so that administrators can recover that data more efficiently. In many cases, that information that is encrypted and has had an accident entails a lot of recovery effort and in some cases, it cannot be recovered reliably and quickly.
Check Point Full Disk Encryption Software Blade has some improvements in its official documentation which can be renewed. The tool is also too expensive to be an add-on to the main solution. I think they could launch it independently so that costs can be lowered. As for the dashboard, I think it could be renewed to be more attractive to users. As for the costs, I think they can also be public so as not to always depend on a partner, this way, the client can be more versatile in their decisions about what they want to implement.
The improvement points that Check Point can make are to add more performance when decrypting to be able to free a unit. This task right now is somewhat slow. Regarding the general topic of support, many have annoyances with it. However, it is due to the time and the management of the help. For the most part they work in a different time zone. They are generally with us at dawn and this doesn't really work. Although they are excellent, they should improve their small problems to try to improve.
They could improve the latency in the platform when entering the portal. They need to improve the time the first encryption takes. It affects the performance time a little too much. I've had negative experiences when it comes to receiving support. The response time is very slow and sometimes the agent changes and you have to explain everything again. In general, however, everything meets the needs very well. They should improve the encryption time on the units at the time of making a recovery of x unit.
They could improve a bit on the encryption time of the units. They take a little time to recover. On the other hand, encryption also takes a little extra when it is completed for the first time. These are some details that can affect the performance of the technology implemented through the blade. It is important to improve the way they provide support. It is not bad, however, sometimes it takes a long time to coordinate sessions.
The response time for technical support could be faster.
While the solution works as it should, it is overly expensive.
I cant speak to any aspects that are lacking. We don't feel there are any missing features. You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.