Most Helpful Review
Researched Trend Micro Endpoint Encryption but chose McAfee Complete Data Protection: Excellent protection that is easy to use with simple access to the DLP
Use Trend Micro Endpoint Encryption? Share your opinion.
Find out what your peers are saying about McAfee Complete Data Protection vs. Trend Micro Endpoint Encryption and other solutions. Updated: January 2021.
455,108 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"With this solution, the device control is more reliable and more stable."
"I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job."
"It is capable of acting as Web control, Device Control, or Data Control."
"The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints."
"In the configuration, you can restrict a user from accessing a removable drive."
"The interface is very good. You can create and manage your own dashboard."
"With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution."
"The server software console is exquisitely designed and organized for handy access and manipulation by the administrator."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The most valuable feature is the support for email."
"Overall, I think that it's very interesting."
"Very good interface."
"The solution should be more user-friendly."
"This solution does not do as well at protecting the end-user against unknown viruses."
"It is difficult to manage."
"The solution needs to reduce the number of false positives. There are too many of them."
"I want simplicity. A new user opening the dashboard will be confused. It needs to be more user-friendly."
"The refresh feature needs improvement. You need to refresh it manually yt going to the address bar, clicking on it and pressing enter, or pressing F5. There should be a button you can click on to refresh or have it so every five seconds it's refreshing."
"The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs."
"I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"It would be great if this solution had support for file integrity monitoring."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"Integration and support could be improved."
Pricing and Cost Advice
"The price of this solution needs to be improved."
"The price is good, it's a low-cost solution."
"This solution is reasonably priced."
"The pricing is better than that of some competing products."
"The pricing of the cloud offering seems confusing."
Information Not Available
Questions from the Community
Top Answer: The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.
Top Answer: This solution is reasonably priced.
Top Answer: The solution needs more advanced features. Customers tend to not like the navigation that is offered. While accessing the DLP is easy, navigating inside of it is difficult. The policies and… more »
Top Answer: Overall, I think that it's very interesting.
Top Answer: In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to… more »
Top Answer: Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior… more »
out of 26 in Endpoint Encryption
Average Words per Review
out of 26 in Endpoint Encryption
Average Words per Review
Compared 62% of the time.
Compared 17% of the time.
Compared 16% of the time.
Compared 2% of the time.
Compared 1% of the time.
Compared 45% of the time.
Compared 15% of the time.
Compared 14% of the time.
Compared 10% of the time.
Compared 2% of the time.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Learn more about McAfee Complete Data Protection
Learn more about Trend Micro Endpoint Encryption
|Xcel Energy||Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta|
Computer Software Company32%
Comms Service Provider17%
Computer Software Company30%
Comms Service Provider26%
No Data Available
McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 11 reviews while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 4 reviews. McAfee Complete Data Protection is rated 7.8, while Trend Micro Endpoint Encryption is rated 7.8. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". McAfee Complete Data Protection is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, Symantec Endpoint Encryption, Sophos SafeGuard and Carbon Black CB Defense, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Carbon Black CB Defense, Sophos SafeGuard and ESET Endpoint Encryption. See our McAfee Complete Data Protection vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.