Oracle Advanced Security vs Trend Micro Endpoint Encryption comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Oracle Advanced Security and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
770,141 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option.""The most valuable feature is the data encryption option for columns and tables."

More Oracle Advanced Security Pros →

"Overall, I think that it's very interesting.""Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level.""Offers very good endpoint security solutions.""The product's initial setup phase is easy, considering the management console and software.""The most valuable feature of Trend Micro Endpoint Encryption is security.""It's a secure and quick solution.""We use the solution for data encryption.""The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."

More Trend Micro Endpoint Encryption Pros →

Cons
"Having a single command to encrypt a table would be an improvement.""It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained."

More Oracle Advanced Security Cons →

"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful.""I would like to improve the solution's support.""We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution.""Should have more features of Deep Scanning""There are recovery issues that arise.""The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function.""It would be great if this solution had support for file integrity monitoring.""I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."

More Trend Micro Endpoint Encryption Cons →

Pricing and Cost Advice
Information Not Available
  • "One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
  • "You have to pay for the license annually."
  • "We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
  • "The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
  • "The solution's licensing costs are yearly."
  • "I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
  • "I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
  • More Trend Micro Endpoint Encryption Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    770,141 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:The product's initial setup phase is easy, considering the management console and software.
    Top Answer:The licensing part of the product is managed by the IT infra team in my company. You need to make payments towards the user-based license. In a company with around 100 users, there is a need to pay… more »
    Top Answer:I cannot make any modifications or changes in the application currently. The product's scalability is an area of concern where improvements are required.
    Ranking
    12th
    out of 28 in Endpoint Encryption
    Views
    519
    Comparisons
    376
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    4th
    out of 28 in Endpoint Encryption
    Views
    2,120
    Comparisons
    1,036
    Reviews
    11
    Average Words per Review
    391
    Rating
    8.0
    Comparisons
    Learn More
    Overview

    Oracle Advanced Security provides data encryption and strong authentication services to the Oracle database, safeguarding sensitive data against unauthorized access from the network and the operating system. It also protects against theft, loss, and improper decommissioning of storage media and database backups.

    Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

    Sample Customers
    IBVI, illycaffe, Scottish water, trueblue, AirAsia
    Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Government10%
    Computer Software Company10%
    Healthcare Company9%
    REVIEWERS
    Financial Services Firm22%
    Outsourcing Company11%
    Comms Service Provider11%
    Educational Organization11%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Government13%
    Financial Services Firm9%
    Real Estate/Law Firm7%
    Company Size
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise13%
    Large Enterprise73%
    REVIEWERS
    Small Business67%
    Midsize Enterprise19%
    Large Enterprise14%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption. Updated: April 2024.
    770,141 professionals have used our research since 2012.

    Oracle Advanced Security is ranked 12th in Endpoint Encryption while Trend Micro Endpoint Encryption is ranked 4th in Endpoint Encryption with 20 reviews. Oracle Advanced Security is rated 8.0, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Used for mobile device protection with moderate pricing". Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Oracle Data Masking and Subsetting and Protegrity Data Security, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint and McAfee Complete Data Protection.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.