Most Helpful Review | |||
| Use Trend Micro Endpoint Encryption? Share your opinion. | ||
Find out what your peers are saying about McAfee Complete Data Protection vs. Trend Micro Endpoint Encryption and other solutions. Updated: January 2021. 455,108 professionals have used our research since 2012. |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice | |
"The price of this solution needs to be improved." "The price is good, it's a low-cost solution." "This solution is reasonably priced." "The pricing is better than that of some competing products." "The pricing of the cloud offering seems confusing." More McAfee Complete Data Protection Pricing and Cost Advice » | Information Not Available |
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs. 455,108 professionals have used our research since 2012. | |
Questions from the Community | |
Top Answer: The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage. Top Answer: This solution is reasonably priced. Top Answer: The solution needs more advanced features. Customers tend to not like the navigation that is offered. While accessing the DLP is easy, navigating inside of it is difficult. The policies and… more » | Top Answer: Overall, I think that it's very interesting. Top Answer: In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to… more » Top Answer: Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior… more » |
Ranking | |
Views 4,937 Comparisons 4,130 Reviews 9 Average Words per Review 652 Rating 7.8 | Views 2,073 Comparisons 1,688 Reviews 4 Average Words per Review 577 Rating 7.8 |
Popular Comparisons | |
![]() Compared 62% of the time. ![]() Compared 17% of the time. ![]() Compared 16% of the time. ![]() Compared 2% of the time. ![]() Compared 1% of the time. | ![]() Compared 45% of the time. ![]() Compared 15% of the time. ![]() Compared 14% of the time. ![]() Compared 10% of the time. ![]() Compared 2% of the time. |
Learn | |
McAfee | Trend Micro |
Overview | |
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more. | Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change. |
Offer | |
Learn more about McAfee Complete Data Protection | Learn more about Trend Micro Endpoint Encryption |
Sample Customers | |
Xcel Energy | Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta |
Top Industries | |
Computer Software Company32% Comms Service Provider17% Government11% Insurance Company5% | Computer Software Company30% Comms Service Provider26% Transportation Company6% Retailer5% |
Company Size | |
Small Business58% Midsize Enterprise17% Large Enterprise25% | No Data Available |
McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 11 reviews while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 4 reviews. McAfee Complete Data Protection is rated 7.8, while Trend Micro Endpoint Encryption is rated 7.8. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". McAfee Complete Data Protection is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, Symantec Endpoint Encryption, Sophos SafeGuard and Carbon Black CB Defense, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Carbon Black CB Defense, Sophos SafeGuard and ESET Endpoint Encryption. See our McAfee Complete Data Protection vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.