Trend Micro Endpoint Encryption Reviews

Filter by:Reset all filters
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Real User
Network Administrator at a consultancy with 51-200 employees
Dec 02 2019

What is most valuable?

The most important feature is that they give you the full path and full description of any compromise to the system. For example, if you have a compromised work station, Endpoint can give you the full… more»

What needs improvement?

To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the… more»

What's my experience with pricing, setup cost, and licensing?

I do not handle the contracting part, but normally we go for a 3 to 5-year contract to get a better price over time.

Which solution did I use previously and why did I switch?

Before we changed, we were looking for endpoint protection for the work station and the server. Specifically, we wanted a solution for what they call deep security and we found that in Apex One… more»

What other advice do I have?

We do not use the cloud because we are not that happy with our experience trying to use it. You can call us old school but we are happy to have all our data on-premise. The advice I would give to… more»

Which other solutions did I evaluate?

Before Trend Micro Endpoint Encryption we did look at other solutions. I tried looking at Kaspersky and Norton. There really is no comparing them with Trend Micro. They are not serious competitors in… more»


User Assessments By Topic About Trend Micro Endpoint Encryption

Find out what your peers are saying about Trend Micro, Microsoft, Symantec and others in Endpoint Encryption. Updated: January 2020.
391,329 professionals have used our research since 2012.

Trend Micro Endpoint Encryption Questions

What is Trend Micro Endpoint Encryption?

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Trend Micro Endpoint Encryption customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta