Compare Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
446,956 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
446,956 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: Overall, I think that it's very interesting.
Top Answer: In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to… more »
Top Answer: Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior… more »
Ranking
14th
out of 26 in Endpoint Encryption
Views
926
Comparisons
833
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
7th
out of 26 in Endpoint Encryption
Views
2,153
Comparisons
1,777
Reviews
4
Average Words per Review
577
Avg. Rating
7.8
Popular Comparisons
Learn
Check Point
Trend Micro
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Trend Micro Endpoint Encryption
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Top Industries
VISITORS READING REVIEWS
Computer Software Company26%
Comms Service Provider22%
Government19%
Healthcare Company4%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider27%
Retailer6%
Construction Company6%
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: November 2020.
446,956 professionals have used our research since 2012.
Check Point Full Disk Encryption Software Blade is ranked 14th in Endpoint Encryption while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 4 reviews. Check Point Full Disk Encryption Software Blade is rated 0.0, while Trend Micro Endpoint Encryption is rated 7.8. On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, ESET Endpoint Encryption, WinMagic SecureDoc and Sophos SafeGuard, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Carbon Black CB Defense, Sophos SafeGuard and Cisco AMP for Endpoints.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.