• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • API Management
      • View All
    • Artificial Intelligence

      • Generative AI Knowledge Management Apps/General Productivity
      • AI Code Assistants (Transitioning to AI Coding Agents)
      • AI Application Development Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • Conversational AI Platforms
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Hybrid Cloud Storage
      • Primary Storage Platforms
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Data and Analytics Governance Platforms
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • SD-WAN
      • Intranet Packaged Solutions
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Planning Software
      • Financial Close and Consolidation Solutions
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Managed Detection and Response
      • Email Security
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Visual Collaboration Applications
      • Collaborative Work Management
      • Meeting Solutions
      • Knowledge Management (KM) Software
      • View All
    • Public Sector and Government

      • Cloud-Based ERP for U.S. Local Government
      • Government Budgeting and Planning Solution
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications
      • Digital Shelf Analytics
      • View All
    • Sales

      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Advanced Distribution Management Systems
      • Asset Investment Planning Solutions for Energy and Utilities (Transitioning to Asset Investment Planning Solutions)
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • API Management
      • AI-Augmented Software Testing Tools
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • Business Process Automation Tools
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Enterprise Architecture Tools
      • Custom Software Development Services
      • Code Review Tools
      • Business Orchestration and Automation Technologies
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Code Modernization Tools
      • Digital Twin of an Organization Platforms
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Event Brokers
      • Application Integration Platforms
      • Green Software Engineering
      • Virtual Reality Development Software
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Portfolio Management Tools
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • Load Testing Tools
      • AI Agent Development Platforms for Software Engineering
      • Blockchain Consulting and Proof-of-Concept Development Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Check Point Full Disk Encryption Software
Logo of Check Point Full Disk Encryption Software

Check Point Full Disk Encryption Software

byCheck Point Software Technologies
in Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
4.7

Overview

Product Information on Check Point Full Disk Encryption Software

Updated 13th October 2025

What is Check Point Full Disk Encryption Software?

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Check Point Full Disk Encryption Software Pricing

Check Point Full Disk Encryption Software uses a subscription-based pricing model that typically depends on the number of devices or endpoints protected. Pricing can vary based on licensing terms, contract duration, and may include support and updates as part of the subscription.

Overall experience with Check Point Full Disk Encryption Software

AUDIT ASSOCIATE
<50M USD, Banking
FAVORABLE

“Secure, Centralized and Reliable, but setup demands preparation”

5.0
Oct 13, 2025
The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
Director of Data & Service Management
<50M USD, Miscellaneous
CRITICAL

“Navigating User Satisfaction and Discontent for Popular Product”

3.0
May 31, 2024
It works as claimed and the integration with Windows seems to be well developed is a positive aspect. The decryption process sometimes does feel a bit lag on preformance, but overall still acceptable. This could be one area to further improve on. There's recovery option in case you forgot your password, which is a nice feature.

About Company

Company Description

Updated 14th July 2024

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Company Details

Updated 26th February 2025
Company type
Public
Year Founded
1993
Head office location
San Carlos, United States
Number of employees
5001 - 10000
Website
http://www.checkpoint.com

Do You Manage Peer Insights at Check Point Software Technologies?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Check Point Full Disk Encryption Software
Deciding Factors: Check Point Full Disk Encryption Software Vs. Market Average
Performance of Check Point Full Disk Encryption Software Across Market Features

Check Point Full Disk Encryption Software Likes & Dislikes

Like

Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.

Like

Ease of use. Information is displayed. Performance reasonable.

Like

It has Pre-boot Authentication which reduces the offline risk It Supports iOS and also Windows You can easily recover a password that is forgotten or access it with One time login

Dislike

IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.

Dislike

Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.

Dislike

Initial deployment is a bit tricky, you will have to invest time to get your hands on it There is scope for improvement in iOS as it is not that smooth and fast.

Top Check Point Full Disk Encryption Software Alternatives

Logo of Harmony Mobile
1. Harmony Mobile
4.6
(105 Ratings)
Logo of Microsoft BitLocker
2. Microsoft BitLocker
4.3
(72 Ratings)
Logo of Harmony Endpoint
3. Harmony Endpoint
4.5
(71 Ratings)
View All Alternatives

Peer Discussions

Check Point Full Disk Encryption Software Reviews and Ratings

4.7

(93 Ratings)

Rating Distribution

5 Star
59%
4 Star
40%
3 Star
1%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.5

Integration & Deployment

4.5

Service & Support

4.4

Product Capabilities

4.5

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • AUDIT ASSOCIATE
    <50M USD
    Banking
    Review Source

    Secure, Centralized and Reliable, but setup demands preparation

    5.0
    Oct 13, 2025
    The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
  • DEPUTY MANAGER
    50M-1B USD
    Real Estate
    Review Source

    Check Point Full Disk Encryption Strengthens Mobile Security With Key Authentication

    4.0
    Oct 2, 2025
    I am really happy with Check Point Full Disk Encryption as it delivered to me what I wanted which is I wanted a purpose built solution to anchor the foundation of my mobile security. There is no fear of data loss now as it also prevents that.
  • Product Manager
    <50M USD
    IT Services
    Review Source

    Reliable and secure full-disk encryption - excellent data protection with some setup and usability challenges.

    5.0
    Nov 5, 2025
    Check Point full disk encryption provides strong data protection with reliable encryption and centralized management. It ensures sensitive information remains secure across endpoints, meeting compliance and regulatory requirements.
  • ASSOCIATE
    50M-1B USD
    Manufacturing
    Review Source

    Sensitive Data Protected While Product Operates Unobtrusively in Background

    5.0
    Oct 28, 2025
    It encrypts the disk fully, keeps sensitive information safe, and runs quietly in the background. It’s easy to manage and doesn’t affect system performance much, helping us secure laptops and desktops without extra free hasule.
  • NETWORK SECURITY ENGINEER
    50M-1B USD
    Construction
    Review Source

    Centralised Management and transparent user experience

    4.0
    Dec 7, 2025
    Checkpoint's full disc encryption feels like a mature enterprise grade solution for protecting laptops and desktops. When configured properly. It provides very strong protection, full disk encryption, reboot authentication, centralised management, and seamless working for the user.
...
Showing Result 1-5 of 152

Recommended Gartner Research

  • Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
  • Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.