Dell Encryption Enterprise [EOL] vs Trend Micro Endpoint Encryption comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Dell Encryption Enterprise [EOL] and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Check Point Software Technologies and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: March 2024).
765,234 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server.""One place where I can give them top level is the tiered administration, whereby you can assign roles to the support team to say, "You would be responsible for changing passwords. You would be responsible for system management and configurations, and you are the major admin of this." They have that on lockdown. The active directory integration is also pretty okay. It is not so bad. It does have normal features that most of the encryption tools have, such as full-disk encryption, volume encryption, and external drive encryption. I am not sure if they do file-level encryption and if DLP is integrated with the encryption product. I would like to assume that these features are there.""The technical support provided by Dell EMC comes with proactive technical support."

More Dell Encryption Enterprise [EOL] Pros →

"The most valuable feature of Trend Micro Endpoint Encryption is security.""Fast encryption feature.""The solution is good overall. All of its features are good.""Trend Micro provides good overall protection. It has saved us from a few attacks and malware.""The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment.""Very good interface.""Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level.""The most valuable feature is the support for email."

More Trend Micro Endpoint Encryption Pros →

Cons
"As soon as we introduce any new tools or applications, we have to work with the back-end team to handle new problems that are created. Once they're figured out, the solution will stabilize, but the problems keep coming up whenever we introduce a new tool or application. It has been a challenge.""It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user.""Some customers have less security in the solution regarding their data."

More Dell Encryption Enterprise [EOL] Cons →

"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution.""In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.""Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust.""I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration.""To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.""Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities.""They need to come up with cloud solutions.""Integration and support could be improved."

More Trend Micro Endpoint Encryption Cons →

Pricing and Cost Advice
Information Not Available
  • "One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
  • "You have to pay for the license annually."
  • "We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
  • "The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
  • "The solution's licensing costs are yearly."
  • "I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
  • "I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
  • More Trend Micro Endpoint Encryption Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server.
    Top Answer:I see a lot of room for improvement in a couple of areas. One is that the decryption process is a bit complex and takes a lot of time, depending on how many files you have. If that can be improved, it… more »
    Top Answer:My company uses this solution for end-to-end encryption.
    Top Answer:The product's initial setup phase is easy, considering the management console and software.
    Top Answer:The licensing part of the product is managed by the IT infra team in my company. You need to make payments towards the user-based license. In a company with around 100 users, there is a need to pay… more »
    Top Answer:I cannot make any modifications or changes in the application currently. The product's scalability is an area of concern where improvements are required.
    Ranking
    Unranked
    In Endpoint Encryption
    4th
    out of 28 in Endpoint Encryption
    Views
    2,237
    Comparisons
    1,137
    Reviews
    10
    Average Words per Review
    382
    Rating
    8.0
    Comparisons
    Learn More
    Overview
    Information Not Available

    Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

    Sample Customers
    Information Not Available
    Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
    Top Industries
    No Data Available
    REVIEWERS
    Outsourcing Company13%
    Comms Service Provider13%
    Educational Organization13%
    Security Firm13%
    VISITORS READING REVIEWS
    Computer Software Company13%
    Government13%
    Financial Services Firm9%
    Real Estate/Law Firm6%
    Company Size
    No Data Available
    REVIEWERS
    Small Business70%
    Midsize Enterprise20%
    Large Enterprise10%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise21%
    Large Enterprise58%
    Buyer's Guide
    Endpoint Encryption
    March 2024
    Find out what your peers are saying about Microsoft, McAfee, Check Point Software Technologies and others in Endpoint Encryption. Updated: March 2024.
    765,234 professionals have used our research since 2012.

    Dell Encryption Enterprise [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Encryption with 3 reviews while Trend Micro Endpoint Encryption is ranked 4th in Endpoint Encryption with 19 reviews. Dell Encryption Enterprise [EOL] is rated 7.4, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Dell Encryption Enterprise [EOL] writes "Helpful auto-decryption features and great tech support, but problems with adding new applications and a time-consuming decryption process". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". Dell Encryption Enterprise [EOL] is most compared with , whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, Symantec Endpoint Encryption and McAfee Complete Data Protection.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.