SHARE
Facebook X Pinterest WhatsApp

Check Point Full Disk Encryption Software Blade: Product Overview and Analysis

See our complete list of top 10 enterprise encryption solutions. Company Description Check Point Software began in 1993 with a firewall offering and has since expanded to cover more security territory. It focuses on network cybersecurity and endpoint protection. It is publicly traded. Product Description The Check Point Full Disk Encryption Software Blade provides automatic […]

Written By
thumbnail Drew Robb
Drew Robb
Aug 15, 2017
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

See our complete list of top 10 enterprise encryption solutions.

Company Description

Check Point Software began in 1993 with a firewall offering and has since expanded to cover more security territory. It focuses on network cybersecurity and endpoint protection. It is publicly traded.

Product Description

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft. It protects from unauthorized access when laptops are lost or stolen, and provides support for Windows and Mac OS X. This product automatically encrypts all information on the hard drive. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.

Agents

Agents are used.

Markets and Use Cases

Check Point protects more than 100,000 organizations of all sizes.

Applicable Metrics

It has been successfully used in data security deployments of more than 200,000 seats, and boasts a deployment rate of up to 50,000 seats per month.

Security Qualifications

Encryption algorithm standards, including XTS-AES and AES-CBC, are employed. Its CryptoCore encryption engine is certified to be compliant with FIPS 140-2 guidelines. It is compliant with Common Criteria and BITS. Trusted Platform Module and Network Authorized Preboot Bypass (Unlock On LAN) are also supported.

Standalone or Suite

Users deploy Check Point blades and can choose between encryption alone, or in most cases, include encryption as part of a larger endpoint security suite.

Delivery

The encryption software is packaged inside a Check Point Software Blade. Users choose from a variety of blades to deploy the protection they need.

Pricing

Check Point pricing is based around the sale of hardware blades, which contain various software features according to user need. The Check Point 4800 Data Protection Appliance with eight blades, for example, provides a data protection suite with a list price of $31,000. Pricing varies according to the software included.

thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
John the Ripper: Beginner’s Tutorial and Review
Julien Maury
Sep 3, 2025
The 6 Best Enterprise Password Managers You’ll Actually Trust
Matt Gonzales
Aug 27, 2025
5 Cloud Security Providers You Might Be Overlooking
Matt Gonzales
Aug 25, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.