Trend Micro Endpoint Encryption Initial Setup

AltafSiddiqui - PeerSpot reviewer
Network Engineer at iBoss Tech Solutions Pvt. Ltd

The product's initial setup phase is easy, considering the management console and software. I don't have any experience with the configuration part since the product was already configured when I joined the organization.

The solution is deployed on an on-premises model.

View full review »
NI
Head of IT at ALC

I would rate the initial setup experience a nine out of ten. The setup is straightforward without much complications. We upgraded two years ago; it wasn't that hard, I believe it was straightforward. However, the encryption process takes longer than expected. We had a couple of cases in which we were delayed for the users because it took more time than expected. 

View full review »
MM
Principal Network Controller at GCIS

I rate the initial setup phase of Trend Micro Endpoint Encryption a seven on a scale of one to ten, where one is difficult, and ten is easy.

The solution is deployed on an on-premises model, though in the future, my company plans to move to the cloud version of the solution.

The solution can be deployed in a day.

More than one person is required to take care of the solution's deployment process.

View full review »
Buyer's Guide
Trend Micro Endpoint Encryption
March 2024
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.
sheik abdul kader  - PeerSpot reviewer
Unicorp Technologies LLC at Unicorp Technologies LLC

I would rate the initial setup a nine out of ten. Our clients use the tool on-cloud and on-premises. Deployment of this solution does not take much time. Hardware-wise, for on-prem devices, where we are installing IP or Activewire sort of things, it takes one day time. For endpoint client installation, when I am pushing the files from the server itself, it will take hardly an hour to finish setting up all the systems. 

View full review »
DM
IT Infrastructure Analyst - Full at Zanini

Endpoint Encryption is complex to set up. Infrastructure and security engineers are responsible for setting up the solution and maintaining it. 

View full review »
AP
Technology Competency and Solution Head at LearningMate

The initial setup is easy. 

Implementation did not require much effort, only for configuration to be done with the server.

View full review »
EO
Information Security Management Individual Contributor at First Bank of Nigeria Ltd.

The initial setup is straightforward.  We did it in-house. We've implemented a solution where we deploy Ethernet connectivity to all our endpoints, mainly focusing on securing mobile devices.

View full review »
RK
Service delivery senior manager at Advika

The product's setup is neither straightforward nor complicated. 

View full review »
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN

The initial setup is straightforward. One person is enough for it.

An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.

View full review »
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies

Trend Micro Endpoint Encryption is kind of easy to install and easy to configure. It takes about a day or two to implement this solution. One person can implement and maintain this solution.

View full review »
Durai  Singh - PeerSpot reviewer
Business Owner at Ararat Technologies

The initial setup is straightforward. 

View full review »
NS
Cyber Security Engineer at a security firm with 11-50 employees

Although the setup is largely straightforward, there can be some complexity. It's a moderate setup process. 

The deployment typically takes 15 to 20 minutes. It's pretty quick. 

The solution is not difficult to maintain. 

View full review »
AA
Network Administrator at a consultancy with 51-200 employees

The initial setup was straightforward. In the beginning, we started with our system environment and then we applied it to production. So once you enable the option, your machine is up and protected because all the setup and all of the configurations are out of the box. Maybe there was some customization applied here. It depends on the environment. But the main options function out of the box.

View full review »
TS
Technical Associate at Intimesolutions

The setup process is pretty good. It's not overly complex. 

The deployment took about ten minutes or so. It's pretty fast. We can configure the solution using scripts. 

View full review »
SB
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees

The initial setup is not very complex. It took about three weeks to deploy, then there is some fine-tuning to be done over time.

View full review »
LaithQuraam - PeerSpot reviewer
Operations and Sales Manager at Alpha Hub

The initial setup of Trend Micro Endpoint Encryption is good.

View full review »
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.

We install Trend Micro Endpoint Encryption on the client's system which is not complex.

View full review »
EG
Senior Information Security Consultant at Future Telecom

The initial setup is straightforward - it takes about eight minutes. 

View full review »
Buyer's Guide
Trend Micro Endpoint Encryption
March 2024
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,740 professionals have used our research since 2012.