Compare Check Point Full Disk Encryption Software Blade vs. Trend Micro Mobile Security

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Microsoft, Sophos, Digital Guardian and others in Mobile Data Protection. Updated: November 2020.
447,546 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"Each license costs about $10/year. It's fairly inexpensive because it's a new product. In Pakistan, no more than two or three companies can apply for mobile protection right now. I don't know if there are ancillary costs above the standard licensing fee."

More Trend Micro Mobile Security Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Mobile Data Protection solutions are best for your needs.
447,546 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East.
Top Answer: Pricing can vary from situation to situation. But to be honest, I don't have much exposure to the prices because I'm mostly looking into the technical part. So I can't give you much about the prices… more »
Top Answer: From a technical point of view, I don't have much to give in terms of feedback on what could be improved. But there have been some users who have been complaining about the interface being unfriendly… more »
Ranking
7th
Views
926
Comparisons
833
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
4th
Views
674
Comparisons
440
Reviews
3
Average Words per Review
531
Avg. Rating
8.7
Popular Comparisons
Learn
Check Point
Trend Micro
Overview

The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
Learn more about Full disk encryption.

Trend Micro Mobile Security Solutions includes Trend Micro Mobile Security for Android and Trend Micro Mobile Security for iOS devices that provide advanced comprehensive protection against ransonware, identity theft, phishing scams, fraudulent websites, etc and safeguards your privacy on Facebook and Twitter. It also includes Trend Micro Password Manager software that helps to securely store all passwords and sensitive information, to access them when needed on PCs, Macs, and mobile phones and tablets.
Offer
Learn more about Check Point Full Disk Encryption Software Blade
Learn more about Trend Micro Mobile Security
Sample Customers
Osmose, International Fund for Animal Welfare (IFAW)Alertboot, Babou, Ponsse
Top Industries
VISITORS READING REVIEWS
Computer Software Company25%
Comms Service Provider22%
Government18%
Financial Services Firm5%
No Data Available
Find out what your peers are saying about Microsoft, Sophos, Digital Guardian and others in Mobile Data Protection. Updated: November 2020.
447,546 professionals have used our research since 2012.
Check Point Full Disk Encryption Software Blade is ranked 7th in Mobile Data Protection while Trend Micro Mobile Security is ranked 4th in Mobile Data Protection with 3 reviews. Check Point Full Disk Encryption Software Blade is rated 0.0, while Trend Micro Mobile Security is rated 8.6. On the other hand, the top reviewer of Trend Micro Mobile Security writes "Heightened mobile protection that is user-friendly and offers lots of custom features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, ESET Endpoint Encryption, WinMagic SecureDoc and Sophos SafeGuard, whereas Trend Micro Mobile Security is most compared with Lookout, Sophos Mobile, McAfee MVISION Mobile, Sophos SafeGuard and Microsoft BitLocker.

See our list of best Mobile Data Protection vendors.

We monitor all Mobile Data Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.