Overview
Product Information on Check Point Full Disk Encryption Software
What is Check Point Full Disk Encryption Software?
Check Point Full Disk Encryption Software Pricing
Overall experience with Check Point Full Disk Encryption Software
“Secure, Centralized and Reliable, but setup demands preparation”
“Navigating User Satisfaction and Discontent for Popular Product”
About Company
Company Description
Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.
Company Details
Do You Manage Peer Insights at Check Point Software Technologies?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: Check Point Full Disk Encryption Software
Deciding Factors: Check Point Full Disk Encryption Software Vs. Market Average
Performance of Check Point Full Disk Encryption Software Across Market Features
Check Point Full Disk Encryption Software Likes & Dislikes
Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.
Ease of use. Information is displayed. Performance reasonable.
It has Pre-boot Authentication which reduces the offline risk It Supports iOS and also Windows You can easily recover a password that is forgotten or access it with One time login
IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.
Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.
Initial deployment is a bit tricky, you will have to invest time to get your hands on it There is scope for improvement in iOS as it is not that smooth and fast.
Top Check Point Full Disk Encryption Software Alternatives
Peer Discussions
Check Point Full Disk Encryption Software Reviews and Ratings
- AUDIT ASSOCIATE<50M USDBankingReview Source
Secure, Centralized and Reliable, but setup demands preparation
The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption. - DEPUTY MANAGER50M-1B USDReal EstateReview Source
Check Point Full Disk Encryption Strengthens Mobile Security With Key Authentication
I am really happy with Check Point Full Disk Encryption as it delivered to me what I wanted which is I wanted a purpose built solution to anchor the foundation of my mobile security. There is no fear of data loss now as it also prevents that. - Product Manager<50M USDIT ServicesReview Source
Reliable and secure full-disk encryption - excellent data protection with some setup and usability challenges.
Check Point full disk encryption provides strong data protection with reliable encryption and centralized management. It ensures sensitive information remains secure across endpoints, meeting compliance and regulatory requirements. - ASSOCIATE50M-1B USDManufacturingReview Source
Sensitive Data Protected While Product Operates Unobtrusively in Background
It encrypts the disk fully, keeps sensitive information safe, and runs quietly in the background. It’s easy to manage and doesn’t affect system performance much, helping us secure laptops and desktops without extra free hasule. - NETWORK SECURITY ENGINEER50M-1B USDConstructionReview Source
Centralised Management and transparent user experience
Checkpoint's full disc encryption feels like a mature enterprise grade solution for protecting laptops and desktops. When configured properly. It provides very strong protection, full disk encryption, reboot authentication, centralised management, and seamless working for the user.


