We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The number one feature I found was that the install was really easy, it was quite helpful."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The most valuable feature is the support for email."
"Overall, I think that it's very interesting."
"Very good interface."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"For a future release, the interface looks a bit dated and could be improved."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"It would be great if this solution had support for file integrity monitoring."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"Integration and support could be improved."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"I found some of their licensing is a bit complex. I am also finding that some of their cloud solutions are quite expensive."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
Across industries-from compliance mandates such as PCI and GDPR to new IT initiatives such as data analytics and cloud migration-businesses rely on Voltage SecureData to secure their information at its core while at rest, in motion, and in use for comprehensive protection without gaps.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Micro Focus Voltage SecureData Enterprise is ranked 9th in Endpoint Encryption with 1 review while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 5 reviews. Micro Focus Voltage SecureData Enterprise is rated 8.0, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Micro Focus Voltage SecureData Enterprise writes "Effortless install, features rich, and scalable". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". Micro Focus Voltage SecureData Enterprise is most compared with Vormetric Data Security Platform, Protegrity Data Security, Oracle Advanced Security, IBM Guardium Data Protection and Vormetric Application Crypto Suite, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Symantec Endpoint Encryption, Sophos SafeGuard and Cisco AMP for Endpoints.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.