No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Full Disk Encryption Software Blade vs Cisco Secure Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Endpoint Encryption (6th), Mobile Data Protection (3rd)
Cisco Secure Endpoint
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
49
Ranking in other categories
Endpoint Protection Platform (EPP) (32nd), Endpoint Detection and Response (EDR) (26th), Cisco Security Portfolio (8th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Check Point Full Disk Encryption Software Blade is designed for Endpoint Encryption and holds a mindshare of 4.3%, up 2.1% compared to last year.
Cisco Secure Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.3% mindshare, down 1.5% since last year.
Endpoint Encryption Mindshare Distribution
ProductMindshare (%)
Check Point Full Disk Encryption Software Blade4.3%
Microsoft BitLocker16.5%
Symantec Endpoint Encryption8.1%
Other71.1%
Endpoint Encryption
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cisco Secure Endpoint1.3%
Microsoft Defender for Endpoint7.0%
CrowdStrike Falcon6.2%
Other85.5%
Endpoint Protection Platform (EPP)
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
JavedHashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies
Reliable threat protection is achieved while integration and analysis capabilities need refinement
Cisco Secure Endpoint is very good in machine learning, which allows it to secure offline contents even if not connected to the internet. We haven't encountered a single breach after it's deployed. It controls USB devices and has a separate antivirus solution called Tetra, providing security even for real-time, day-zero attacks through its strong Talos threat intelligence platform.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Check Point gives us the possibility of reaching each security goal we have and has been a strategic ally for our internal assurance and the security of our information within the organization."
"The solution is pretty reliable."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"The solution provides complete security for one's workstation."
"We use the solution for endpoint encryption and it handles everything, with security, a firewall within the workstation, and DLP within the solution and on the workstation, making use of 360-degree security on one's workstation."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"The initial setup is easy."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The implementation was performed, with support from Cisco partners, in a few hours and in the following days AMP 4 Endpoints found many things that the old antivirus solution missed, which was a very huge advantage for us."
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The most valuable feature is its threat protection and data privacy, including its cyber attack and data protection, as we need to cover and protect data on user devices."
"I'm only using the AMP (advanced malware protection) which is protecting my file system from all the malicious things that might happen. It should protect all kinds of things that might happen on the servers, things that I cannot see."
"Device Trajectory is one of the most valuable features. We're able to dig in and really understand how things came to be and where to focus our efforts."
"It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."
"Cisco AMP is the broadest, most integrated security platform that connects the breadth of Cisco's integrated security portfolio and the customer's infrastructure for a consistent experience."
"The product provides sandboxing options like file reputation and file analysis."
 

Cons

"The response time for technical support could be faster."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"Sometimes the performance rates are not consistent."
"In the future, I would like to see is the ability to decrypt equipment."
"The response time for technical support could be faster."
"The price is high for small scale business enterprises."
"It cannot currently block URLs over websites."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The one challenge that I see is the use of multiple endpoint protection platforms. What winds up happening is, e.g., if I get an alert for a potential incident or malware and want to pull the file, I'll go to fetch the file to analyze it, but one of these other programs has already gotten it, so the file has already been quarantined by another endpoint protection system."
"The thing I hate the most, which they have not fixed, is when it creates duplicate entries within a console."
"We had a lot of noise at the beginning, and we had to turn it down based on exclusions, application whitelisting, and excluding unknown benign applications. Cisco should understand the need for continuous updates on the custom Cisco exclusions and the custom applications that come out-of-the-box with the AMP for Endpoints."
"The room for improvement would be on event notifications. I do feel that if you subscribe to all the event notification types out-of-the-box, or don't really go through and take the time to filter out events, the notifications can become overwhelming with information."
"Due to the complexity of the technology that is used and its advanced threat detection capabilities, it is possible to encounter many delays in operation."
"The user interface is dull."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"We can know if something bad is potentially happening instantaneously and prevent it from happening. We can go to a device and isolate it before it infects other devices. In our environment, that's millions of dollars saved in a matter of seconds."
"The pricing and licensing are reasonable. The cost of AMP for Endpoints is inline with all the other software that has a monthly endpoint cost. It might be a little bit higher than other antivirus type products, but we're only talking about a dollar a month per user. I don't see that cost as being an issue if it's going to give us the confidence and security that we're looking for. We have had a lot of success and happiness with what we're using, so there's no point in changing."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The pricing and licensing fees are okay."
"My company does make annual payments towards the licensing costs of the solution. Cisco Secure Endpoint is a little bit expensive."
"You must make monthly payments towards the licensing charges attached to the product. There are no extra charges apart from the standard licensing fees associated with the product."
"Cisco's pricing is reasonable. We also do not need to opt for niche players, which would have charged us significantly more than Cisco for ecosystem solutions. We are highly satisfied with the pricing structure of Cisco's solutions they are reasonable."
"There is also the Cisco annual subscription plus my management time in terms of what I do with the Cisco product. I spend a minimal amount of time on it though, just rolling out updates as they need them and monitoring the console a couple of times a day to ensure nothing is out of control. Cost-wise, we are quite happy with it."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Manufacturing Company
10%
Comms Service Provider
8%
Government
8%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
By reviewers
Company SizeCount
Small Business21
Midsize Enterprise14
Large Enterprise21
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have something for data protection that I might not know about since I am not a profess...
What do you like most about Cisco Secure Endpoint?
The product's initial setup phase was very simple.
What is your experience regarding pricing and costs for Cisco Secure Endpoint?
Cisco is aggressive in pricing, making it competitive and sometimes even cheaper than other good products like CrowdStrike, Microsoft Defender, or SentinelOne.
What needs improvement with Cisco Secure Endpoint?
Cisco Secure Endpoint lacks features like DLP which other vendors offer. XDR is new, so integration capabilities with third-party tools need improvement. The forensic capabilities need enhancement,...
 

Also Known As

No data available
Cisco AMP for Endpoints
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: May 2026.
893,221 professionals have used our research since 2012.