ZENworks Suite vs Trend Micro Endpoint Encryption comparison

Cancel
You must select at least 2 products to compare!
Trend Micro Logo
2,120 views|1,036 comparisons
77% willing to recommend
OpenText Logo
374 views|211 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Trend Micro Endpoint Encryption and ZENworks Suite based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
770,292 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Fast encryption feature.""The solution is good overall. All of its features are good.""Trend Micro Endpoint Encryption has good performance and is secure.""The most valuable feature is the support for email.""The encryption is very good.""The most valuable feature of Trend Micro Endpoint Encryption is security.""Very good interface.""Trend Micro provides good overall protection. It has saved us from a few attacks and malware."

More Trend Micro Endpoint Encryption Pros →

"The setup is pretty straightforward.""The stability is good."

More ZENworks Suite Pros →

Cons
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function.""It would be great if this solution had support for file integrity monitoring.""Integration and support could be improved.""Should have more features of Deep Scanning""We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software.""I would like to improve the solution's support.""Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities.""Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."

More Trend Micro Endpoint Encryption Cons →

"If they could introduce it on the cloud, it would be ideal.""I'm not on the most current version, however, I know one area that I didn't get into that I kind of wanted to is to have a mobile device management tool. My understanding is it's improved a lot from the version I have. It may be a feature that is already available."

More ZENworks Suite Cons →

Pricing and Cost Advice
  • "One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
  • "You have to pay for the license annually."
  • "We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
  • "The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
  • "The solution's licensing costs are yearly."
  • "I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
  • "I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
  • More Trend Micro Endpoint Encryption Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    770,292 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product's initial setup phase is easy, considering the management console and software.
    Top Answer:The licensing part of the product is managed by the IT infra team in my company. You need to make payments towards the user-based license. In a company with around 100 users, there is a need to pay… more »
    Top Answer:I cannot make any modifications or changes in the application currently. The product's scalability is an area of concern where improvements are required.
    Top Answer:I wasn't part of the pricing process. It's outside my scope.
    Top Answer:The deployment of patches is too complex. You have too many tasks to handle the actual job. It also has a lot of hardware requirements and resources. It needs to be lighter and easier. If they could… more »
    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    2,120
    Comparisons
    1,036
    Reviews
    11
    Average Words per Review
    391
    Rating
    8.0
    9th
    out of 28 in Endpoint Encryption
    Views
    374
    Comparisons
    211
    Reviews
    1
    Average Words per Review
    461
    Rating
    9.0
    Comparisons
    Also Known As
    ZENworks
    Learn More
    Overview

    Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

    ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption) reduces the cost of deploying, managing, and troubleshooting encrypted laptops and desktops. It has automated data protection that locks out threats. It manages encrypted devices remotely and cut travel costs. Avoids security breaches and stay out of the news and gives IT staff a familiar management environment.
    Sample Customers
    Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
    CSC
    Top Industries
    REVIEWERS
    Financial Services Firm22%
    Outsourcing Company11%
    Comms Service Provider11%
    Educational Organization11%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Government13%
    Financial Services Firm9%
    Real Estate/Law Firm7%
    VISITORS READING REVIEWS
    Government18%
    Computer Software Company11%
    Comms Service Provider8%
    Financial Services Firm8%
    Company Size
    REVIEWERS
    Small Business67%
    Midsize Enterprise19%
    Large Enterprise14%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise19%
    Large Enterprise59%
    VISITORS READING REVIEWS
    Small Business31%
    Midsize Enterprise15%
    Large Enterprise54%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, Sophos, Check Point Software Technologies and others in Endpoint Encryption. Updated: April 2024.
    770,292 professionals have used our research since 2012.

    Trend Micro Endpoint Encryption is ranked 4th in Endpoint Encryption with 20 reviews while ZENworks Suite is ranked 9th in Endpoint Encryption with 2 reviews. Trend Micro Endpoint Encryption is rated 8.0, while ZENworks Suite is rated 9.6. The top reviewer of Trend Micro Endpoint Encryption writes "Used for mobile device protection with moderate pricing". On the other hand, the top reviewer of ZENworks Suite writes "Greta for remote control and management with good performance". Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint and McAfee Complete Data Protection, whereas ZENworks Suite is most compared with Microsoft BitLocker, Ivanti Device Control and Symantec Endpoint Encryption.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.