Trend Micro Endpoint Encryption Competitors and Alternatives

Read reviews of Trend Micro Endpoint Encryption competitors and alternatives
Real User
Infrastructure Specialist at a healthcare company with 1,001-5,000 employees
Jul 25 2017

What do you think of Microsoft BitLocker?

Valuable Features It is integrated with the hardware, via use of TPM It is also integrated with the Windows operating system and thus: It is free! • Improvements to My Organization Protects employee and enterprise data in case of loss of a laptop. Fills in part of an enterprise-wide security strategy. • Room for Improvement Remote management (e.g., enable/disable, reset, etc.) of PIN codes and recovery keys would be a nice feature. • Use of Solution I've used this solution for more than five years. • Stability Issues No, very few issues. • Scalability Issues No, it is a very light feature towards infrastructure requirements. Having an AD infrastructure is sufficient. • Customer Service and Technical Support Good. • Previous Solutions No. •...
Consultant
Solution Sales Specialist at a tech services company with 5,001-10,000 employees
Feb 25 2018

What is most valuable?

Real-time threat prevention using sandboxing, file trajectory, and retrospective security. On the prevention side, AMP has nine engines. New feature AMP Visibility (beta) is an IR orchestration tool, where the local AMP for Endpoint... more»

How has it helped my organization?

Provides enhanced security, lowering IT risks, and IT operational costs by integrating with Cisco NGFW, network security and email security.

What needs improvement?

It does not include: * Encryption * Decryption of local file shares * Disks and URL filtering are done by separate product.
Real User
Operator at Halliburton
Jul 10 2017

What is most valuable?

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

How has it helped my organization?

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

What needs improvement?

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»

Sign Up with Email