Absolute Visibility vs. Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Absolute Visibility
Score 8.1 out of 10
N/A
Absolute Visibility is an adaptive endpoint security solution. It provides users with a persistent connection to all of their endpoints and the data they contain. The vendor says, by maintaining a two-way connection with each device, users have the insight they need to assess risk and apply remote security measures so they can protect each endpoint and the sensitive data it contains. This insight is delivered through a cloud-based console that requires no additional IT…N/A
Check Point Endpoint Media Encryption and Port Protection (Pointsec)
Score 9.9 out of 10
N/A
Check Point Endpoint Media Encryption and Port Protection solution, based on technology acquired with the former Pointsec, is an endpoint encryption option from Check Point Software Technologies in California.N/A
Pricing
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Top Pros
Top Cons
Best Alternatives
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
Bitdefender GravityZone
Bitdefender GravityZone
Score 8.7 out of 10
Medium-sized Companies
NinjaOne
NinjaOne
Score 9.2 out of 10
Symantec Encryption
Symantec Encryption
Score 9.9 out of 10
Enterprises
Citrix Endpoint Management
Citrix Endpoint Management
Score 8.3 out of 10
Trellix Complete Data Protection
Trellix Complete Data Protection
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Likelihood to Recommend
9.5
(2 ratings)
9.0
(2 ratings)
User Testimonials
Absolute VisibilityCheck Point Endpoint Media Encryption and Port Protection (Pointsec)
Likelihood to Recommend
Absolute
I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information or devices that contain proprietary information, critical business information or other information that needs to be securely protected. It can also be used to track a device (individual) as well if that is your goal. We use it as an extra precaution to track our mental health clinicians that do home visits. It allows us to keep track of their whereabouts, in case an issue arises at a client's home. We are able to send someone out to check or assist, alert emergency services or send law enforcement if a situation should arise.
Read full review
Check Point Software Technologies
Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
Read full review
Pros
Absolute
  • I tracked a stolen computer all the way to Africa from USA and disabled it.
  • I set up geofences with alerts. As soon as a computer got a wifi connection outside of our fences it would email me its current location.
  • Absolute's persistent technology was helpful. -Even when a pawn shop would attempt to "wipe" a device before getting it online, as soon as it got online it notified me of the OS re-installation and current location. We could call authorities and they could recover the device for us. And they were happy it made their job easier and deterred the pawn shop from reselling stolen devices.
Read full review
Check Point Software Technologies
  • The product works with Windows, Linux, and OS X.
  • The management of Pointsec has really become very simple and centralized for all IT to handle with ease.
  • Preboot encryption keys in the form of a password, by inserting a USB drive containing the key and/or using a one-time password generating device such as an RSA token.
Read full review
Cons
Absolute
  • I do not know where I would consider this product to be deficient in functionality, difficult to use or any major changes that needed to be addressed.
  • I wish the pricing of this product was a little lower, but I do think it is well worth the cost and consideration, especially if you are using it on devices containing electronic medical records, personal health information or personal privacy information.
Read full review
Check Point Software Technologies
  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Read full review
Alternatives Considered
Absolute
I have only used Absolute Data and Device Security (DDS). It was recommended by my Dell sales rep. After reviewing the product info, and loading a demo, it became clear that this is what was needed to add to our existing security to protect us from information loss due to a data breach on our portable devices. I presented this solution to the appropriate departments, and they agreed that this was something well worth the investment.
Read full review
Check Point Software Technologies
Symantec Encryption, a few management points led me to evaluate and not go with it.
Read full review
Return on Investment
Absolute
  • Recovery of stolen assets.
  • After recovering a few devices and students becoming aware of Absolute being deployed, it had a prevention effect deterring additional theft.
  • It deterred pawn shops from accepting our stolen machines.
Read full review
Check Point Software Technologies
  • It protects your data to being leaked from Endpoint.
  • It protects the Removal Storage Media unauthorize use on other endpoint
  • The policy management is user freindly and roll out on the endpoint is just a signle click away to protect your sensative data.
Read full review
ScreenShots

Absolute Visibility Screenshots

Screenshot of Endpoint Data Discovery SummaryScreenshot of Create Smart Device GroupsScreenshot of Software Overview ReportScreenshot of Create Policy GroupsScreenshot of Endpoint Data Discovery Match Score SummaryScreenshot of Endpoint Data Discovery Reporting Data