Compare Dell Encryption Enterprise vs. Trend Micro Endpoint Encryption

Cancel
You must select at least 2 products to compare!
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: January 2021.
457,209 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The technical support provided by Dell EMC comes with proactive technical support."

More Dell Encryption Enterprise Pros »

"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level.""The most valuable feature is the support for email.""Overall, I think that it's very interesting.""Very good interface."

More Trend Micro Endpoint Encryption Pros »

Cons
"Some customers have less security in the solution regarding their data."

More Dell Encryption Enterprise Cons »

"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.""It would be great if this solution had support for file integrity monitoring.""In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.""Integration and support could be improved."

More Trend Micro Endpoint Encryption Cons »

report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
457,209 professionals have used our research since 2012.
Questions from the Community
Top Answer: The technical support provided by Dell EMC comes with proactive technical support.
Top Answer: Some customers have less security in the solution regarding their data. We need to use multiple security applications and a set of security protocols. So security could be improved. Also, if Dell… more »
Top Answer: We provide the services and the solution architecture proposing the features for our customers and clients. Most of them are using hybrid architecture. They may use their own private for the main… more »
Top Answer: Overall, I think that it's very interesting.
Top Answer: In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to… more »
Top Answer: On a scale of one to ten I would rate Trend Micro Endpoint Encryption a six. In Indonesia, with our client/our partner, I am hands-on with this solution. Trend Micro, Kaspersky, Symantec, they're all… more »
Ranking
9th
out of 26 in Endpoint Encryption
Views
118
Comparisons
59
Reviews
1
Average Words per Review
374
Rating
9.0
7th
out of 26 in Endpoint Encryption
Views
2,073
Comparisons
1,688
Reviews
4
Average Words per Review
577
Rating
7.8
Popular Comparisons
Learn
Dell EMC
Trend Micro
Overview
Information Not Available

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Offer
Learn more about Dell Encryption Enterprise
Learn more about Trend Micro Endpoint Encryption
Sample Customers
Information Not Available
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Top Industries
No Data Available
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider27%
Retailer7%
Transportation Company6%
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: January 2021.
457,209 professionals have used our research since 2012.

Dell Encryption Enterprise is ranked 9th in Endpoint Encryption with 1 review while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 4 reviews. Dell Encryption Enterprise is rated 9.0, while Trend Micro Endpoint Encryption is rated 7.8. The top reviewer of Dell Encryption Enterprise writes "Has remarkable support and good stability ". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". Dell Encryption Enterprise is most compared with Microsoft BitLocker, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Carbon Black CB Defense, Sophos SafeGuard and Cisco AMP for Endpoints.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.