6 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 9 out of 100
21 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.1 out of 100

Attribute Ratings

  • Check Point Endpoint Media Encryption and Port Protection (Pointsec) is rated higher in 1 area: Likelihood to Recommend

Likelihood to Recommend

9.0

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

90%
2 Ratings
8.5

Sophos Central Device Encryption

85%
5 Ratings

Likelihood to Recommend

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Check Point Endpoint Media Encryption and Port Protection (Pointsec) is well suited for Microsoft Windows environment. While, for MacOS it is less appropriate.
Raj Kumar Jha | TrustRadius Reviewer

Sophos Central Device Encryption

We found the incorporated system of both AV and Encryption to be an absolute breath of fresh air for us.It is great for small and mid-sized companies. We rolled this out across our 4 global regions. We created region-specific groups for our endpoints and placed the appropriate endpoints into those groups. [Then] we defined policies for AV and Encryption that would be used inter-region and assigned roles to the different regions' support staff. Great stuff.
Anonymous | TrustRadius Reviewer

Pros

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

  • The product works with Windows, Linux, and OS X.
  • The management of Pointsec has really become very simple and centralized for all IT to handle with ease.
  • Preboot encryption keys in the form of a password, by inserting a USB drive containing the key and/or using a one-time password generating device such as an RSA token.
Bonn Chavez | TrustRadius Reviewer

Sophos Central Device Encryption

  • Email encryption, it can encrypt based on the criteria defined. We use regex for this to discover the content.
  • We can have a view of what is the content of the email being quarantined.
  • We use Sophos together with our Email Exchange
Anonymous | TrustRadius Reviewer

Cons

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

  • Types of devices to control needs to be added like McAfee and GFI Endpoint Security.
  • Device whitelisting needs more granular level like by Vendor ID, Serial Number, Device ID etc.
  • Device Control and Media Protection on MacOS to be added.
Raj Kumar Jha | TrustRadius Reviewer

Sophos Central Device Encryption

  • simply the interface
  • usability for non technical teams
Alli Vaughan | TrustRadius Reviewer

Pricing Details

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

Sophos Central Device Encryption

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

Alternatives Considered

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

Symantec Encryption, a few management points led me to evaluate and not go with it.
Bonn Chavez | TrustRadius Reviewer

Sophos Central Device Encryption

The only other one we looked at was Symantec endpoint encryption this seemed less feature reach and less user friendly.
Anonymous | TrustRadius Reviewer

Return on Investment

Check Point Endpoint Media Encryption and Port Protection (Pointsec)

  • It protects your data to being leaked from Endpoint.
  • It protects the Removal Storage Media unauthorize use on other endpoint
  • The policy management is user freindly and roll out on the endpoint is just a signle click away to protect your sensative data.
Raj Kumar Jha | TrustRadius Reviewer

Sophos Central Device Encryption

  • Intangible benefits to the organization data, data is highly secure
  • No worries to users and IT for data stolen outside the organization
  • Protected from malware and ransomware
Muneer Ahmed Khan,ITIL® v3 | TrustRadius Reviewer

Add comparison