• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Overview

Product Information on Check Point Full Disk Encryption Software (Legacy)

Updated 13th October 2025

What is Check Point Full Disk Encryption Software (Legacy)?

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Check Point Full Disk Encryption Software (Legacy) Pricing

Check Point Full Disk Encryption Software uses a subscription-based pricing model that typically depends on the number of devices or endpoints protected. Pricing can vary based on licensing terms, contract duration, and may include support and updates as part of the subscription.

Overall experience with Check Point Full Disk Encryption Software (Legacy)

AUDIT ASSOCIATE
<50M USD, Banking
FAVORABLE

“Secure, Centralized and Reliable, but setup demands preparation”

5.0
Oct 13, 2025
The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
Director of Data & Service Management
<50M USD, Miscellaneous
CRITICAL

“Navigating User Satisfaction and Discontent for Popular Product”

3.0
May 31, 2024
It works as claimed and the integration with Windows seems to be well developed is a positive aspect. The decryption process sometimes does feel a bit lag on preformance, but overall still acceptable. This could be one area to further improve on. There's recovery option in case you forgot your password, which is a nice feature.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Peer Discussions

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

  1. Home
  2. /
  3. Check Point Full Disk Encryption Software (Legacy)
Logo of Check Point Full Disk Encryption Software (Legacy)

Check Point Full Disk Encryption Software (Legacy)

byCheck Point Software Technologies
in Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
4.7

About Company

Company Description

Updated 14th July 2024

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Company Details

Updated 26th February 2025
Company type
Public
Year Founded
1993
Head office location
San Carlos, United States
Number of employees
5001 - 10000
Website
http://www.checkpoint.com

Do You Manage Peer Insights at Check Point Software Technologies?

Access Vendor Portal to update and manage your profile.

Performance of Check Point Full Disk Encryption Software (Legacy) Across Market Features

Check Point Full Disk Encryption Software (Legacy) Likes & Dislikes

Like

Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.

Like

Ease of use. Information is displayed. Performance reasonable.

Like

Robust full-disk encryption with minimal performance impact. Centralized management and policy control for all endpoints. seamless integration with the Checkpoint Endpoint Security Suite.

Dislike

IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.

Dislike

Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.

Dislike

initial deployment and key recovery can be complex. limited user self-service options for password recovery. occasional compatibility issues with older hardware or OS versions.

Recommended Gartner Insights

  • Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
  • Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Top Check Point Full Disk Encryption Software (Legacy) Alternatives

Check Point Full Disk Encryption Software (Legacy) Reviews and Ratings

Deciding Factors: Check Point Full Disk Encryption Software (Legacy) Vs. Market Average
Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • AUDIT ASSOCIATE
    <50M USD
    Banking
    Review Source

    Secure, Centralized and Reliable, but setup demands preparation

    5.0
    Oct 13, 2025
    The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
  • Product Manager
    <50M USD
    IT Services
    Review Source

    Reliable and secure full-disk encryption - excellent data protection with some setup and usability challenges.

    5.0
    Nov 5, 2025
    Check Point full disk encryption provides strong data protection with reliable encryption and centralized management. It ensures sensitive information remains secure across endpoints, meeting compliance and regulatory requirements.
  • ASSOCIATE
    50M-1B USD
    Manufacturing
    Review Source

    Sensitive Data Protected While Product Operates Unobtrusively in Background

    5.0
    Oct 28, 2025
    It encrypts the disk fully, keeps sensitive information safe, and runs quietly in the background. It’s easy to manage and doesn’t affect system performance much, helping us secure laptops and desktops without extra free hasule.
  • NETWORK SECURITY ENGINEER
    50M-1B USD
    Construction
    Review Source

    Centralised Management and transparent user experience

    4.0
    Dec 7, 2025
    Checkpoint's full disc encryption feels like a mature enterprise grade solution for protecting laptops and desktops. When configured properly. It provides very strong protection, full disk encryption, reboot authentication, centralised management, and seamless working for the user.
  • IT SERVICES ASSOCIATE
    50M-1B USD
    IT Services
    Review Source

    Managed Environments Benefit From CP Full Disk Encryption’s Minimal Performance Impact

    4.0
    Dec 17, 2025
    CP Full Disk Encryption provides a strong level of protection with minimal impact on the performance of the system, integration is good in managed environments & most importantly for prioritising data security
...
Showing Result 1-5 of 147

4.7

(93 Ratings)

Rating Distribution

5 Star
59%
4 Star
40%
3 Star
1%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.5

Integration & Deployment

4.5

Service & Support

4.4

Product Capabilities

4.5

Logo of Harmony Mobile
1. Harmony Mobile
4.6
(105 Ratings)
Logo of Harmony Endpoint
2. Harmony Endpoint
4.5
(71 Ratings)
Logo of Trend Micro Endpoint Encryption (Legacy)
3. Trend Micro Endpoint Encryption (Legacy)
4.6
(25 Ratings)
View All Alternatives
Reviewer Insights for: Check Point Full Disk Encryption Software (Legacy)