Check Point Full Disk Encryption Software Blade: Product Overview and Analysis

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

See our complete list of top 10 enterprise encryption solutions.

Company Description

Check Point Software began in 1993 with a firewall offering and has since expanded to cover more security territory. It focuses on network cybersecurity and endpoint protection. It is publicly traded.

Product Description

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft. It protects from unauthorized access when laptops are lost or stolen, and provides support for Windows and Mac OS X. This product automatically encrypts all information on the hard drive. Logical partitions are boot-protected and encrypted sector-by-sector. Attempts to copy individual files or to introduce rogue programs are blocked, even when the hard drive is removed and slaved to a different computer.

Agents

Agents are used.

Markets and Use Cases

Check Point protects more than 100,000 organizations of all sizes.

Applicable Metrics

It has been successfully used in data security deployments of more than 200,000 seats, and boasts a deployment rate of up to 50,000 seats per month.

Security Qualifications

Encryption algorithm standards, including XTS-AES and AES-CBC, are employed. Its CryptoCore encryption engine is certified to be compliant with FIPS 140-2 guidelines. It is compliant with Common Criteria and BITS. Trusted Platform Module and Network Authorized Preboot Bypass (Unlock On LAN) are also supported.

Standalone or Suite

Users deploy Check Point blades and can choose between encryption alone, or in most cases, include encryption as part of a larger endpoint security suite.

Delivery

The encryption software is packaged inside a Check Point Software Blade. Users choose from a variety of blades to deploy the protection they need.

Pricing

Check Point pricing is based around the sale of hardware blades, which contain various software features according to user need. The Check Point 4800 Data Protection Appliance with eight blades, for example, provides a data protection suite with a list price of $31,000. Pricing varies according to the software included.

Get the Free Cybersecurity Newsletter

Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.

Drew Robb Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.




Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis