We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is that everything is done on the server."
"The usability is the most valuable feature."
"This solution can be centrally managed."
"The initial setup is easy."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"We're very satisfied with Trend Micro support."
"Very good interface."
"Overall, I think that it's very interesting."
"The most valuable feature is the support for email."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"Integration with central management needs improvement."
"I would like to see better compatibility with mobile devices."
"Sometimes the server console is very slow, so the performance could be improved."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"Integration and support could be improved."
"It would be great if this solution had support for file integrity monitoring."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"Licensing costs are on a yearly basis."
"The pricing is mid-ranged and could be more cost-effective."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 4 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 6 reviews. ESET Endpoint Encryption is rated 8.6, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of ESET Endpoint Encryption writes "A stable solution with good support that assists us with GDPR compliance". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". ESET Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint and Sophos SafeGuard, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Symantec Endpoint Encryption, Sophos SafeGuard and WinMagic SecureDoc. See our ESET Endpoint Encryption vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.