Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.
Real User
Top 5
High level security and scalable
Pros and Cons
  • "The most valuable feature of Trend Micro Endpoint Encryption is security."

    What is our primary use case?

    Our customers are using this solution on a daily basis. We have deployed this solution on-premise and on the cloud. We have clients in many countries in the world, such as the USA and India. 

    What is most valuable?

    The most valuable feature of Trend Micro Endpoint Encryption is security.

    What needs improvement?

    The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems.

    For how long have I used the solution?

    I have used Trend Micro Endpoint Encryption within the last 12 months.

    Buyer's Guide
    Trend Micro Endpoint Encryption
    April 2024
    Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
    770,141 professionals have used our research since 2012.

    What do I think about the scalability of the solution?

    We have a lot of users using this solution.

    The solution is scalable.

    How was the initial setup?

    We install Trend Micro Endpoint Encryption on the client's system which is not complex.

    What about the implementation team?

    We do the implementation of the solution.

    What other advice do I have?

    I rate Trend Micro Endpoint Encryption a ten out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer:
    PeerSpot user
    Senior Information Security Consultant at Future Telecom
    Real User
    Very good interface; integration and support could be improved
    Pros and Cons
    • "Very good interface."
    • "Integration and support could be improved."

    What is most valuable?

    The interface is a great feature. 

    What needs improvement?

    Improvement of the solution could be made in relation to integration and support. For instance, quarantining endpoints which are reflected into a container, and not allowing the traffic to pass is something that you would expect from integration. It should inform the other devices on the network that there is a malicious endpoint, which has been quarantined. That EDR capability is not there.

    For how long have I used the solution?

    I've been using this solution for two years. 

    What do I think about the stability of the solution?

    It's a stable solution. 

    What do I think about the scalability of the solution?

    This solution is not so scalable. We have a couple of guys who allow the endpoint security to run, they're admins. 

    How are customer service and technical support?

    We have not had any issues with Trend Micro but we've never raised any case with them. It's very rare that we would need support. 

    Which solution did I use previously and why did I switch?

     We previously used Symantec as a solution but the product was quite old, and we had a lot of issues because it was slow. Many of the malwares, malicious programs used to run without Symantec informing or alerting that there was an issue.

    How was the initial setup?

    The initial setup is straightforward - it takes about eight minutes. 

    What other advice do I have?

    I would not recommend this solution. 

    I would rate this product a six out of 10.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Trend Micro Endpoint Encryption
    April 2024
    Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
    770,141 professionals have used our research since 2012.
    Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
    Real User
    All your files can be encrypted and stored in the cloud
    Pros and Cons
    • "We're very satisfied with Trend Micro support."
    • "I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."

    What is our primary use case?

    There are basically two ways it can be deployed. It can be deployed in the cloud or it can be deployed in your endpoint. All your endpoints can be encrypted in the firewall and all your files can be encrypted and stored in the cloud if it is a cloud deployment. 

    How has it helped my organization?

    It passes your data as encrypted in all of your endpoints so that data is more secure so any threat of theft is minimized. 

    What is most valuable?

    I don't have much in the way of creative experience, but yes it was good.

    What needs improvement?

    I would like to see more integration. More feasible / secure cloud-based solutions need to arrive. I'd like to see better integration with administrative tools & Active Directory integration. 

    For how long have I used the solution?

    There are only one or two projects that I have done on Endpoint Encryption. The last time I was working with that was in 2020, so about a year.

    How are customer service and technical support?

    We're very satisfied with Trend Micro support.

    What about the implementation team?

    We work in coordination with Trend Micro itself, so we get advice from them and then implement that. Because it's a big company, they need their direct vendors, contacts, and solutions also.

    What's my experience with pricing, setup cost, and licensing?

    For the license cases, customers directly contact Trend Micro. 

    What other advice do I have?

    I would rate it eight out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    it_user1283538 - PeerSpot reviewer
    Presales Engineer at a tech services company with 11-50 employees
    Real User
    Offers good inspection and the detection of malware but needs better support
    Pros and Cons
    • "Overall, I think that it's very interesting."
    • "In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."

    What is most valuable?

    Over the course of the time I have been using Trend Micro, I would say it is similar to Kaspersky. Overall, I think that it's very interesting, but I wasn't really impressed with the threat protection. For example the threat in the League of Legends for the Cloud.

    What needs improvement?

    In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.

    I would like to see next-gen anti-virus included in the next release.

    For how long have I used the solution?

    I have been using Trend Micro Endpoint Encryption for one year now.

    What do I think about the stability of the solution?

    For the inspection and the detection of malware, it is almost the same as Kaspersky or Symantec. We know they have a module for the use-pack for the malware, to defend from the pack, and I think it's good.

    I have been infected with ransomware that they should catch, and if we get infected it must be learning for it to know it is malware. It's just a weakness. It's not so good for catching ransomware. It's someone in Indonesia. The problem is why we're always with the ransomware.

    What other advice do I have?

    On a scale of one to ten I would rate Trend Micro Endpoint Encryption a six.

    In Indonesia, with our client/our partner, I am hands-on with this solution. Trend Micro, Kaspersky, Symantec, they're all the same. They're really the same technical approach and signature base. It's totally the same for me.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: partner
    PeerSpot user
    Buyer's Guide
    Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2024
    Product Categories
    Endpoint Encryption
    Buyer's Guide
    Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.