Trend Micro Endpoint Encryption Review

Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level

What is our primary use case?

Currently, we are with Trend Micro as an antivirus solution and as our long-term plan to upgrade our solution to cover deep security services. So we plan to have it as not only the antivirus but as a complete endpoint security solution.

Trend Micro has a very good knowledge base. Even with the extensive history of issues available with Microsoft and all the other companies, you will find that the first group to discover and document the issues is Trend Micro. They have a big knowledge base and a big team working to offer this solution. There are a lot of companies available on the market providing similar solutions, but you cannot compare them with Trend Micro as far as depth and disclosure. 

What is most valuable?

The most important feature is that they give you the full path and full description of any compromise to the system. For example, if you have a compromised work station, Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level. The report includes not only the nodes, it goes to the very end of the attack so you can see exactly where it occurs and what changes it has made.

What needs improvement?

To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.

We are very happy with the product. I have seen a lot of products. They are almost similar, but I believe in the Trend Micro model. I don't know why, exactly, except that I have built some trust in the product because I'm dealing with different endpoint solutions for almost 15 years now. I never faced any issue with a virus in my environment using Endpoint. We are protected at all points, all clean, all the time. No attacks from the outside.

For how long have I used the solution?

We have been using this solution for almost two years now.

What do I think about the stability of the solution?

There is no issue with the stability of this product. Even when we do a full survey of your server, you can see that if there has been an attack or any possibility of intrusion. It will detect the problem before it happens. 

There is one other very good option that checks for issues with a compromised update and it does this with any update. So let's say Microsoft, released an update, the problem will be located with deep security and it will automatically block whatever issue is there. It is like a pre-check or a precaution before the actual installation.

What do I think about the scalability of the solution?

We have between 150 to 200 users currently using the solution. We are very small because it is a private central office and we have branches. There are a lot of outside offices.

I do not think we are going to increase the usage of Endpoint Encryption right now because we are already covering all the users, even on their own machine. I don't think we have increased the number of users as we are covered and it is expensive to add more.

How are customer service and technical support?

The technical support for Trend Micro is fortunately only necessary for my central office. We have a dedicated contact with them. Quarterly, someone comes to check and make sure everything is working okay and that we are on the right track. The technical support from Trend Micro is perfect.

Which solution did I use previously and why did I switch?

Before we changed, we were looking for endpoint protection for the work station and the server. Specifically, we wanted a solution for what they call deep security and we found that in Apex One (advanced automated threat detection). So all these options are available, we'll see how they will fit with our environment and then have running to cover as at all times.

How was the initial setup?

The initial setup was straightforward. In the beginning, we started with our system environment and then we applied it to production. So once you enable the option, your machine is up and protected because all the setup and all of the configurations are out of the box. Maybe there was some customization applied here. It depends on the environment. But the main options function out of the box.

What about the implementation team?

We used a local guy for the deployment. Normally, we deal with the same local company. We prefer to have an engineer helping us out. It is not a matter of not trusting the Trend Micro installation, but we like to know that what we do is correct. We want to be sure that we use the best practices that come from Trend Micro.

What's my experience with pricing, setup cost, and licensing?

I do not handle the contracting part, but normally we go for a 3 to 5-year contract to get a better price over time.

Which other solutions did I evaluate?

Before Trend Micro Endpoint Encryption we did look at other solutions. I tried looking at Kaspersky and Norton. There really is no comparing them with Trend Micro. They are not serious competitors in my opinion. We made the choice because of technical capabilities. Once you are talking about security, you should be confident in your product and that it can cover your security needs.

What other advice do I have?

We do not use the cloud because we are not that happy with our experience trying to use it. You can call us old school but we are happy to have all our data on-premise.

The advice I would give to others looking into implementing Trend Micro Endpoint Encryption is that I totally recommend that anyone go with Trend Micro. Just go with them because they are very good.

On a scale from one to ten where ten is the best, I would rate this product a ten. I can say 11. I am very happy with the product.

Which deployment model are you using for this solution?


Which version of this solution are you currently using?

Apex One
**Disclosure: I am a real user, and this review is based on my own experience and opinions.
More Trend Micro Endpoint Encryption reviews from users
...who compared it with Symantec Endpoint Encryption
Find out what your peers are saying about Trend Micro, Microsoft, Broadcom and others in Endpoint Encryption. Updated: June 2021.
510,534 professionals have used our research since 2012.
Add a Comment