We performed a comparison between Check Point Full Disk Encryption Software Blade and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The encryption ensures each of our drives is not invasive and that the user does not have a bad experience even while the drive is being encrypted."
"It keeps the devices well monitored."
"It has addressed storage and data transfer demands efficiently."
"Encryption prevents data loss which can cost the organization a lot of resources."
"This encryption is relatively fast and really covers the needs required."
"End-to-end encryption provides full disk encryption, ensuring that all data on the device, including the operating system."
"It is a cross-platform tool."
"The solution is good overall. All of its features are good."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"Very good interface."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The most valuable feature of the solution is the antivirus part it offers."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The cost of maintaining the system is high for personal use."
"They could improve the latency in the platform when entering the portal."
"The tool should be able to recover data from a stolen device."
"You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"While the solution works as it should, it is overly expensive."
"In the future, I would like to see is the ability to decrypt equipment."
"Regarding the general topic of support, many have annoyances with it."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"Integration and support could be improved."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"Support from them was not fast."
"They need to come up with cloud solutions."
"The product's scalability is an area of concern where improvements are required."
"It is not easy to integrate with third party solutions."
More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →
More Trend Micro Endpoint Encryption Pricing and Cost Advice →
Check Point Full Disk Encryption Software Blade is ranked 3rd in Endpoint Encryption with 16 reviews while Trend Micro Endpoint Encryption is ranked 4th in Endpoint Encryption with 19 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Good encryption with a helpful central management console and excellent reliability". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, Symantec Endpoint Encryption and McAfee Complete Data Protection. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.