Trend Micro Endpoint Encryption Overview

Trend Micro Endpoint Encryption is the #7 ranked solution in our list of top Endpoint Encryption tools. It is most often compared to Microsoft BitLocker: Trend Micro Endpoint Encryption vs Microsoft BitLocker

What is Trend Micro Endpoint Encryption?

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

Buyer's Guide

Download the Endpoint Encryption Buyer's Guide including reviews and more. Updated: June 2021

Trend Micro Endpoint Encryption Customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta

Trend Micro Endpoint Encryption Video

Pricing Advice

What users are saying about Trend Micro Endpoint Encryption pricing:
  • "One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
AA
Network Administrator at a consultancy with 51-200 employees
Real User
Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level

What is our primary use case?

Currently, we are with Trend Micro as an antivirus solution and as our long-term plan to upgrade our solution to cover deep security services. So we plan to have it as not only the antivirus but as a complete endpoint security solution. Trend Micro has a very good knowledge base. Even with the extensive history of issues available with Microsoft and all the other companies, you will find that the first group to discover and document the issues is Trend Micro. They have a big knowledge base and a big team working to offer this solution. There are a lot of companies available on the market… more »

Pros and Cons

  • "Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
  • "To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."

What other advice do I have?

We do not use the cloud because we are not that happy with our experience trying to use it. You can call us old school but we are happy to have all our data on-premise. The advice I would give to others looking into implementing Trend Micro Endpoint Encryption is that I totally recommend that anyone go with Trend Micro. Just go with them because they are very good. On a scale from one to ten where ten is the best, I would rate this product a ten. I can say 11. I am very happy with the product.
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
A comprehensive addition to our security solution with good technical support

What is our primary use case?

Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior analysis to track all of the malware and other threats that come in. We do research on them and publish advisories. We then create the list of IoCs for the endpoint, fully with the help of Trend Micro solutions. We are monitoring the web and also using user-based use cases. If a user is trying to access any malicious sites then it triggers an alert. At this point, we do immediate remediation for that and… more »

Pros and Cons

  • "The most valuable feature is the support for email."
  • "It would be great if this solution had support for file integrity monitoring."

What other advice do I have?

This is a solution that I recommend. My advice for anybody who is implementing this solution is to be prepared to do some fine-tuning. Without fine-tuning, you are never going to get the full benefit from this product. I am interested in seeing the issues with this solution resolved because it will be a great product that will compete with all of the other solutions out there. I would rate this solution a nine out of ten.
Find out what your peers are saying about Trend Micro, Microsoft, Broadcom and others in Endpoint Encryption. Updated: June 2021.
509,641 professionals have used our research since 2012.
Technology Competency and Solution Head at LearningMate
Real User
Top 5Leaderboard
A stable and scalable solution for remotely working in a secure environment

What is our primary use case?

We utilize the latest version. The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment. It also protects us from cyber attacks and malware.

Pros and Cons

  • "The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
  • "We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."

What other advice do I have?

The solution is deployed on cloud. We use the solution for organizational purposes. There are around 1,000 users making use of it in our organization. I would recommend the solution to others. I rate Trend Micro Endpoint Encryption as a nine out of ten.
HH
Presales Engineer at a tech services company with 11-50 employees
Real User
Offers good inspection and the detection of malware but needs better support

Pros and Cons

  • "Overall, I think that it's very interesting."
  • "In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."

What other advice do I have?

On a scale of one to ten I would rate Trend Micro Endpoint Encryption a six. In Indonesia, with our client/our partner, I am hands-on with this solution. Trend Micro, Kaspersky, Symantec, they're all the same. They're really the same technical approach and signature base. It's totally the same for me.
Senior Information Security Consultant at Future Telecom
Real User
Top 5Leaderboard
Very good interface; integration and support could be improved

Pros and Cons

  • "Very good interface."
  • "Integration and support could be improved."

What other advice do I have?

I would not recommend this solution. I would rate this product a six out of 10.