We just raised a $30M Series A: Read our story

Compare Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption and other solutions. Updated: November 2021.
553,954 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The solution provides complete security for one's workstation.""The initial setup is easy.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us."

More Check Point Full Disk Encryption Software Blade Pros »

"Very good interface.""The most valuable feature is the support for email.""We're very satisfied with Trend Micro support.""Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level.""The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment.""Overall, I think that it's very interesting."

More Trend Micro Endpoint Encryption Pros »

Cons
"While the solution works as it should, it is overly expensive.""You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.""The response time for technical support could be faster."

More Check Point Full Disk Encryption Software Blade Cons »

"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration.""To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.""Integration and support could be improved.""In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.""It would be great if this solution had support for file integrity monitoring.""We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."

More Trend Micro Endpoint Encryption Cons »

Pricing and Cost Advice
"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."

More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice »

"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."

More Trend Micro Endpoint Encryption Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
553,954 professionals have used our research since 2012.
Questions from the Community
Top Answer: They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.
Top Answer: I definitely don't have any information regarding the price. I am not involved in the purchase, maintenance, or contract.
Top Answer: The response time for technical support could be faster.
Top Answer: We're very satisfied with Trend Micro support.
Top Answer: For the license cases, customers directly contact Trend Micro.
Top Answer: I would like to see more integration. More feasible / secure cloud-based solutions need to arrive. I'd like to see better integration with administrative tools & Active Directory integration.
Ranking
8th
out of 25 in Endpoint Encryption
Views
1,154
Comparisons
1,032
Reviews
3
Average Words per Review
453
Rating
9.3
5th
out of 25 in Endpoint Encryption
Views
2,077
Comparisons
1,603
Reviews
6
Average Words per Review
491
Rating
8.0
Comparisons
Learn More
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Trend Micro Endpoint Encryption
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Top Industries
VISITORS READING REVIEWS
Computer Software Company26%
Comms Service Provider17%
Financial Services Firm14%
Government10%
VISITORS READING REVIEWS
Computer Software Company26%
Comms Service Provider25%
Retailer5%
Government4%
Company Size
No Data Available
REVIEWERS
Small Business57%
Midsize Enterprise29%
Large Enterprise14%
Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption and other solutions. Updated: November 2021.
553,954 professionals have used our research since 2012.

Check Point Full Disk Encryption Software Blade is ranked 8th in Endpoint Encryption with 3 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 6 reviews. Check Point Full Disk Encryption Software Blade is rated 9.4, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Easy to set up and stable with good technical support". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". Check Point Full Disk Encryption Software Blade is most compared with WinMagic SecureDoc, Microsoft BitLocker, Cisco Secure Endpoint, ESET Endpoint Encryption and McAfee Complete Data Protection, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Symantec Endpoint Encryption, Sophos SafeGuard and Cisco Secure Endpoint. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption report.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.