Most Helpful Review
Researched Symantec Endpoint Encryption but chose Trend Micro Endpoint Encryption: Very good interface; integration and support could be improved
Find out what your peers are saying about Symantec Endpoint Encryption vs. Trend Micro Endpoint Encryption and other solutions. Updated: January 2021.
456,495 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The management console gives us the ability to quickly control who sees what, ensures we are on the latest version, and up-to-date."
"It has reduced the number of incidents related to the loss of information."
"It helps us put antivirus solutions in place and prevent malware from getting to our machines."
"We use it for protecting accounts, which is its most valuable feature."
"The encryption feature is very good."
"Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective."
"We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
"The most valuable features are the messaging features and shared folders."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The most valuable feature is the support for email."
"Overall, I think that it's very interesting."
"Very good interface."
"I would like them to have integration with a wider range of non-Symantec products."
"It's a bit difficult to get good support. Their response times are really bad."
"I can only patch monthly. I don't know what the solution is there, besides being vulnerable for three weeks out of four. But there's got to be an option somehow."
"We would like some advanced security protection features."
"The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product."
"I think that they should improve the on-premises version to include the manageability and simplicity that is available on the cloud."
"If for example, a user forgets the endpoint key, they cannot access their data. We need a support team that is a single point of contact for the IT entity to be trained and to have documentation for troubleshooting and managing the solution."
"The program's disk encryption is not very friendly with Microsoft OS updates. We have a problem with updates failing unless we use a time-consuming work-around."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"It would be great if this solution had support for file integrity monitoring."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"Integration and support could be improved."
Pricing and Cost Advice
"It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need."
"The licensing costs yearly are $5000."
"They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options."
"Depending on how many modules you will use (up to five) the licensing will be more expensive."
"The pricing is fair but there is variability in our area that needs to be addressed."
"The cost of this solution is a little on the higher side."
Information Not Available
Answers from the Community
Questions from the Community
Ask a question
Earn 20 points
Top Answer: Overall, I think that it's very interesting.
Top Answer: In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to… more »
Top Answer: Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior… more »
out of 26 in Endpoint Encryption
Average Words per Review
out of 26 in Endpoint Encryption
Average Words per Review
Compared 55% of the time.
Compared 14% of the time.
Compared 12% of the time.
Compared 4% of the time.
Compared 3% of the time.
Compared 45% of the time.
Compared 13% of the time.
Compared 10% of the time.
Compared 7% of the time.
Compared 5% of the time.
Also Known As
|Symantec Drive Encryption|
|Symantec Drive Encryption, powered by PGP technology provides organizations with strong full-disk and removable media encryption and the ability to integrate with Symantec Data Loss Prevention. Intuitive management enables enterprise scale deployments and features compliance-based, out-of-the-box reporting plus customizable reports. Management capabilities include support for native OS encryption (FileVault2) and Opal compliant self-encrypting drives.|
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Learn more about Symantec Endpoint Encryption
Learn more about Trend Micro Endpoint Encryption
|Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency||Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta|
Financial Services Firm29%
Computer Software Company30%
Comms Service Provider17%
Computer Software Company29%
Comms Service Provider26%
No Data Available
Symantec Endpoint Encryption is ranked 2nd in Endpoint Encryption with 14 reviews while Trend Micro Endpoint Encryption is ranked 7th in Endpoint Encryption with 4 reviews. Symantec Endpoint Encryption is rated 8.0, while Trend Micro Endpoint Encryption is rated 7.8. The top reviewer of Symantec Endpoint Encryption writes "Has good messaging features but the hard drive encryption needs to be improved". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level". Symantec Endpoint Encryption is most compared with Microsoft BitLocker, McAfee Complete Data Protection, ESET Endpoint Encryption, Cisco AMP for Endpoints and Sophos SafeGuard, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Sophos SafeGuard, Cisco AMP for Endpoints and McAfee Complete Data Protection. See our Symantec Endpoint Encryption vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.