• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
  1. Home
  2. /
  3. Check Point Full Disk Encryption Software
Logo of Check Point Full Disk Encryption Software

Check Point Full Disk Encryption Software

byCheck Point Software Technologies
in Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
4.7

Overview

Product Information on Check Point Full Disk Encryption Software

Updated 13th October 2025

What is Check Point Full Disk Encryption Software?

Check Point Full Disk Encryption Software provides encryption for data stored on endpoint devices by encrypting the entire contents of the hard drive, including operating system files and temporary files. The software is designed to prevent unauthorized access to data in the event a device is lost or stolen. It supports centralized management for deployment, monitoring, and enforcement of encryption policies, allowing organizations to standardize data protection across multiple devices. The software includes features such as pre-boot authentication, compliance reporting, and support for multiple platforms. By securing data at rest, it addresses the business problem of data breach risks associated with lost or compromised devices and supports compliance with regulatory requirements regarding data protection.

Check Point Full Disk Encryption Software Pricing

Check Point Full Disk Encryption Software uses a subscription-based pricing model that typically depends on the number of devices or endpoints protected. Pricing can vary based on licensing terms, contract duration, and may include support and updates as part of the subscription.

Overall experience with Check Point Full Disk Encryption Software

AUDIT ASSOCIATE
<50M USD, Banking
FAVORABLE

“Secure, Centralized and Reliable, but setup demands preparation”

5.0
Oct 13, 2025
The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
Director of Data & Service Management
<50M USD, Miscellaneous
CRITICAL

“Navigating User Satisfaction and Discontent for Popular Product”

3.0
May 31, 2024
It works as claimed and the integration with Windows seems to be well developed is a positive aspect. The decryption process sometimes does feel a bit lag on preformance, but overall still acceptable. This could be one area to further improve on. There's recovery option in case you forgot your password, which is a nice feature.

About Company

Company Description

Updated 14th July 2024

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Company Details

Updated 26th February 2025
Company type
Public
Year Founded
1993
Head office location
San Carlos, United States
Number of employees
5001 - 10000
Website
http://www.checkpoint.com

Do You Manage Peer Insights at Check Point Software Technologies?

Access Vendor Portal to update and manage your profile.

Key Insights

A Snapshot of What Matters - Based on Validated User Reviews

Reviewer Insights for: Check Point Full Disk Encryption Software
Deciding Factors: Check Point Full Disk Encryption Software Vs. Market Average
Performance of Check Point Full Disk Encryption Software Across Market Features

Check Point Full Disk Encryption Software Likes & Dislikes

Like

Check Point Full Disk Encryption Software has Pre-Boot Authentication which requires users to authenticate before the operating system loads. Thus unauthorized users cannot access the login screen. The centralized management console allows IT administrators to manage different encryption policies, monitor compliance and deploy updates to all endpoints. The software can encrypt all files on the drive - system files, temporary files, OS files, without requiring user intervention.

Like

Ease of use. Information is displayed. Performance reasonable.

Like

It has Pre-boot Authentication which reduces the offline risk It Supports iOS and also Windows You can easily recover a password that is forgotten or access it with One time login

Dislike

IT teams need to know the Check Point's ecosystem well to effectively deploy and implement the Check Point Full Disk Encryption Software. Deployment and integration with existing infrastructure can sometimes be time-consuming and technically demanding. Another disadvantage is that older devices with limited processing power have slower boot times and reduced performance during encryption tasks. The software also does not always provide real-time visibility into the encryption process or the health of individual endpoints.

Dislike

Setting up can be faster. Need some time to learn to use. But after that it is fine. Would be good if performance can be even speed up further.

Dislike

Initial deployment is a bit tricky, you will have to invest time to get your hands on it There is scope for improvement in iOS as it is not that smooth and fast.

Top Check Point Full Disk Encryption Software Alternatives

Logo of Harmony Mobile
1. Harmony Mobile
4.6
(105 Ratings)
Logo of Microsoft BitLocker
2. Microsoft BitLocker
4.3
(72 Ratings)
Logo of Harmony Endpoint
3. Harmony Endpoint
4.5
(71 Ratings)
View All Alternatives

Peer Discussions

Check Point Full Disk Encryption Software Reviews and Ratings

4.7

(93 Ratings)

Rating Distribution

5 Star
59%
4 Star
40%
3 Star
1%
2 Star
0%
1 Star
0%
Why ratings and reviews count differ?

Customer Experience

Evaluation & Contracting

4.5

Integration & Deployment

4.5

Service & Support

4.4

Product Capabilities

4.5

Filter Reviews
Sort By:
Most helpful
Last 12 Months
Star Rating
Reviewer Type
Reviewer's Company Size
Reviewer's Industry
Reviewer's Region
Reviewer's Job Function
  • AUDIT ASSOCIATE
    <50M USD
    Banking
    Review Source

    Secure, Centralized and Reliable, but setup demands preparation

    5.0
    Oct 13, 2025
    The software encrypts everything on the drive - OS files, user data and deleted files. All endpoints are managed through a centralized console. The encryption process is invisible to the end-user which minimizes disruption.
  • DEPUTY MANAGER
    50M-1B USD
    Real Estate
    Review Source

    Check Point Full Disk Encryption Strengthens Mobile Security With Key Authentication

    4.0
    Oct 2, 2025
    I am really happy with Check Point Full Disk Encryption as it delivered to me what I wanted which is I wanted a purpose built solution to anchor the foundation of my mobile security. There is no fear of data loss now as it also prevents that.
  • Product Manager
    <50M USD
    IT Services
    Review Source

    Reliable and secure full-disk encryption - excellent data protection with some setup and usability challenges.

    5.0
    Nov 5, 2025
    Check Point full disk encryption provides strong data protection with reliable encryption and centralized management. It ensures sensitive information remains secure across endpoints, meeting compliance and regulatory requirements.
  • ASSOCIATE
    50M-1B USD
    Manufacturing
    Review Source

    Sensitive Data Protected While Product Operates Unobtrusively in Background

    5.0
    Oct 28, 2025
    It encrypts the disk fully, keeps sensitive information safe, and runs quietly in the background. It’s easy to manage and doesn’t affect system performance much, helping us secure laptops and desktops without extra free hasule.
  • NETWORK SECURITY ENGINEER
    50M-1B USD
    Construction
    Review Source

    Centralised Management and transparent user experience

    4.0
    Dec 7, 2025
    Checkpoint's full disc encryption feels like a mature enterprise grade solution for protecting laptops and desktops. When configured properly. It provides very strong protection, full disk encryption, reboot authentication, centralised management, and seamless working for the user.
...
Showing Result 1-5 of 152

Recommended Gartner Research

  • Critical Capabilities for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)
  • Magic Quadrant for Mobile Data Protection Solutions (Transitioning to Endpoint Protection Platforms)

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.