The solution is primarily for the endpoint as a firewall-type Blade. We implement several different Blades.
Security And Network Administrator at a comms service provider with 501-1,000 employees
Easy to set up and stable with good technical support
Pros and Cons
- "The initial setup is easy."
- "You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
What is our primary use case?
What is most valuable?
The solution is pretty reliable.
The initial setup is easy.
The stability is very good.
Technical support is pretty good.
What needs improvement?
I cant speak to any aspects that are lacking. We don't feel there are any missing features.
You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.
For how long have I used the solution?
We've been dealing with the solution for three or four years at this point. it's been a while now.
We do use full encryption at this point. Right now, this is just encrypting the hard drives. If you put any type of foreign device in, you have the option to, if you want, utilize it, however, you have to make the choice of encrypting it.
Buyer's Guide
Check Point Full Disk Encryption Software Blade
May 2025

Learn what your peers think about Check Point Full Disk Encryption Software Blade. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution offers good stability. There are no bugs or glitches. It doesn't crash or freeze. the performance is reliable.
What do I think about the scalability of the solution?
I don't really have too many thoughts on scalability. I used to work with it to a certain point, and that was just initially trying to get it implemented and set up. After that, we realized that it's a full-time endeavour. When you mess with the endpoint, you might actually mess with the workstations. I'm not on the help desk or a part of the service team. I'm the network person. I don't get into the day-to-day of pushing updates or making sure that certain Blades were implemented on end user devices and stuff like that.
I'm not sure of the exact number of people on the solution at this time.
How are customer service and support?
Technical support is really good. They are quite reliable and responsive. We've been satisfied with the level of support they have provided.
How was the initial setup?
My understanding is that the initial setup is pretty straightforward. It's not complex. however, I didn't personally implement it. It's not a complex process.
What's my experience with pricing, setup cost, and licensing?
I don't handle the pricing or anything like that. I don't actually get involved in the pricing or licensing aspects of the product.
What other advice do I have?
We're just customers and end-users. We don't have a business relationship with Check Point.
We likely use the most recent version of the solution, however, I cannot speak to the exact version number.
I'd rate the solution at a ten out of ten. It's a pretty robust product and we're satisfied with its capabilities.
Disclosure: I am a real user, and this review is based on my own experience and opinions.


Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Popular Comparisons
Microsoft BitLocker
McAfee Complete Data Protection
Buyer's Guide
Download our free Check Point Full Disk Encryption Software Blade Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which full disk encryption software should we chose?
- What is the difference between "data protection in transit" vs "data protection at rest"?
- What is the best email encryption software for small enterprises using Office 365?
- When evaluating Endpoint Encryption, what aspect do you think is the most important to look for?
- What should one take into account when replacing PGP with Microsoft BitLocker?
- Why do organizations need endpoint encryption?
- What are the main pros and cons of the various Endpoint Encryption solutions on the market?
- How can I tell if there is encryption on?
- What is the best endpoint encryption system?
- Why is Endpoint Encryption important for companies?