• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Agentic Analytics
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Edge Distribution Platforms
      • Intranet Packaged Solutions
      • SD-WAN
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • CRM in Life Sciences
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • IT Service Management Platforms
      • Endpoint Management Tools
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Voice of the Customer Platforms
      • Customer Data Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Adaptive Project Management and Reporting
      • View All
    • Public Sector and Government

      • Government ERP Solutions
      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Engagement Applications (Transitioning to Revenue Action Orchestration)
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Warehouse Management Systems
      • Real-Time Transportation Visibility Platforms
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • Business Orchestration and Automation Technologies
      • Business Process Automation Tools
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Enterprise Architecture Tools
      • Custom Software Development Services
      • Code Review Tools
      • Domain Registrars
      • Digital Adoption Platforms
      • Game Engine Software
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Website Builders
      • Developer Productivity Insight Platforms
      • API Generation Software
      • AI Agents for Application Developers
      • Feature Management
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Application Crowdtesting Services
      • Prototyping Software
      • Mobile App Analytics
      • Virtual Reality Development Software
      • Green Software Engineering
      • Application Integration Platforms
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Test Data Management
      • Event Brokers
      • AI-Augmented Code Modernization Tools
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • AI Agent Development Platforms for Software Engineering
      • Multiexperience Development Platforms
      • Application Composition Platform
      • Application Portfolio Management Tools
      • Internal Developer Portals
      • Load Testing Tools
      • Mobile Development Frameworks
      • Cloud Development Environments
      • B2B Gateway Software
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • API and MCP Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Value Stream Management Platforms
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Check Point Full Disk Encryption Software
Logo of Check Point Full Disk Encryption Software

Check Point Full Disk Encryption Software

byCheck Point Software Technologies
in Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
4.7

Overview

Product Information on Check Point Full Disk Encryption Software

Updated 13th October 2025

What is Check Point Full Disk Encryption Software?

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Check Point Full Disk Encryption Software Pricing

Check Point Full Disk Encryption Software uses a subscription-based pricing model that typically depends on the number of devices or endpoints protected. Pricing can vary based on licensing terms, contract duration, and may include support and updates as part of the subscription.

Overall experience with Check Point Full Disk Encryption Software

AUDIT ASSOCIATE
<50M USD, Banking
FAVORABLE

“Secure, Centralized and Reliable, but setup demands preparation”

5.0
Oct 13, 2025
The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
Director of Data & Service Management
<50M USD, Miscellaneous
CRITICAL

“Navigating User Satisfaction and Discontent for Popular Product”

3.0
May 31, 2024
It works as claimed and the integration with Windows seems to be well developed is a positive aspect. The decryption process sometimes does feel a bit lag on preformance, but overall still acceptable. This could be one area to further improve on. There's recovery option in case you forgot your password, which is a nice feature.

About Company

Company Description

Updated 14th July 2024

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Company Details

Updated 26th February 2025
Company type
Public
Year Founded
1993
Head office location
San Carlos, United States
Number of employees
5001 - 10000
Website
http://www.checkpoint.com

Do You Manage Peer Insights at Check Point Software Technologies?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Check Point Full Disk Encryption Software
Deciding Factors: Check Point Full Disk Encryption Software Vs. Market Average
Performance of Check Point Full Disk Encryption Software Across Market Features

Check Point Full Disk Encryption Software Likes & Dislikes

Like

Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.

Like

Ease of use. Information is displayed. Performance reasonable.

Like

Robust full-disk encryption with minimal performance impact. Centralized management and policy control for all endpoints. seamless integration with the Checkpoint Endpoint Security Suite.

Dislike

IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.

Dislike

Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.

Dislike

initial deployment and key recovery can be complex. limited user self-service options for password recovery. occasional compatibility issues with older hardware or OS versions.

Top Check Point Full Disk Encryption Software Alternatives

Logo of Harmony Mobile
1. Harmony Mobile
4.6
(105 Ratings)
Logo of Microsoft BitLocker
2. Microsoft BitLocker
4.3
(72 Ratings)
Logo of Harmony Endpoint
3. Harmony Endpoint
4.5
(71 Ratings)
View All Alternatives

Peer Discussions

Check Point Full Disk Encryption Software Reviews and Ratings

4.7

(93 Ratings)

Rating Distribution

5 Star
59%
4 Star
40%
3 Star
1%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.5

Integration & Deployment

4.5

Service & Support

4.4

Product Capabilities

4.5

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • AUDIT ASSOCIATE
    <50M USD
    Banking
    Review Source

    Secure, Centralized and Reliable, but setup demands preparation

    5.0
    Oct 13, 2025
    The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
  • Product Manager
    <50M USD
    IT Services
    Review Source

    Reliable and secure full-disk encryption - excellent data protection with some setup and usability challenges.

    5.0
    Nov 5, 2025
    Check Point full disk encryption provides strong data protection with reliable encryption and centralized management. It ensures sensitive information remains secure across endpoints, meeting compliance and regulatory requirements.
  • ASSOCIATE
    50M-1B USD
    Manufacturing
    Review Source

    Sensitive Data Protected While Product Operates Unobtrusively in Background

    5.0
    Oct 28, 2025
    It encrypts the disk fully, keeps sensitive information safe, and runs quietly in the background. It’s easy to manage and doesn’t affect system performance much, helping us secure laptops and desktops without extra free hasule.
  • DEPUTY MANAGER
    50M-1B USD
    Real Estate
    Review Source

    Check Point Full Disk Encryption Strengthens Mobile Security With Key Authentication

    4.0
    Oct 2, 2025
    I am really happy with Check Point Full Disk Encryption as it delivered to me what I wanted which is I wanted a purpose built solution to anchor the foundation of my mobile security. There is no fear of data loss now as it also prevents that.
  • NETWORK SECURITY ENGINEER
    50M-1B USD
    Construction
    Review Source

    Centralised Management and transparent user experience

    4.0
    Dec 7, 2025
    Checkpoint's full disc encryption feels like a mature enterprise grade solution for protecting laptops and desktops. When configured properly. It provides very strong protection, full disk encryption, reboot authentication, centralised management, and seamless working for the user.
...
Showing Result 1-5 of 152

Recommended Gartner Insights

  • Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
  • Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.