Most Helpful Review
Researched Trend Micro Endpoint Encryption but chose Symantec Endpoint Encryption: Effective cloud ransomware and malware protection
Researched Symantec Endpoint Encryption but chose Trend Micro Endpoint Encryption: Offers good inspection and the detection of malware but needs better support
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The most valuable feature is that it works in the background so that the end-users are not aware of what is happening on the laptop.
This product is a solid, all-in-one solution for enterprise data management.
The most valuable features are the messaging features and shared folders.
We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data.
Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective.
The encryption feature is very good.
We use it for protecting accounts, which is its most valuable feature.
It has reduced the number of incidents related to the loss of information.
Overall, I think that it's very interesting.
The most valuable feature is the support for email.
Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level.
I do not find the environment to be very user-friendly.
The instability of the company and lack of presence in the Middle East is affecting product use.
The program's disk encryption is not very friendly with Microsoft OS updates. We have a problem with updates failing unless we use a time-consuming work-around.
If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution.
I think that they should improve the on-premises version to include the manageability and simplicity that is available on the cloud.
The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product.
We would like some advanced security protection features.
It's a bit difficult to get good support. Their response times are really bad.
In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.
It would be great if this solution had support for file integrity monitoring.
To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.
Pricing and Cost Advice
The cost of this solution is a little on the higher side.
The pricing is fair but there is variability in our area that needs to be addressed.
Depending on how many modules you will use (up to five) the licensing will be more expensive.
They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options.
The licensing costs yearly are $5000.
It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need.
Information Not Available
out of 27 in Endpoint Encryption
Average Words per Review
out of 27 in Endpoint Encryption
Average Words per Review
Compared 61% of the time.
Compared 8% of the time.
Compared 7% of the time.
Compared 48% of the time.
Compared 17% of the time.
Compared 12% of the time.
Also Known As
|Symantec Drive Encryption|
|Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.|
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Learn more about Symantec Endpoint Encryption
Learn more about Trend Micro Endpoint Encryption
|Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency||Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta|
Software R&D Company31%
Financial Services Firm15%
Comms Service Provider10%
No Data Available