Trend Micro Endpoint Encryption Valuable Features

Network Administrator at a consultancy with 51-200 employees
The most important feature is that they give you the full path and full description of any compromise to the system. For example, if you have a compromised work station, Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level. The report includes not only the nodes, it goes to the very end of the attack so you can see exactly where it occurs and what changes it has made. View full review »
Sanjeet Kumar Bhuyan
Security Consultant and Cybersecurity Support at a tech services company with 1-10 employees
The most valuable feature is the support for email. There is a module called DDEI, the Deep Discovery Email Inspector, which tracks and has the ability to block email. It scans incoming and outgoing emails, including the attachments. One of the new problems is the hiding of malware within fonts, so this solution will scan attached fonts to see if any of them are malicious. View full review »
Presales Engineer at a tech services company with 11-50 employees
Over the course of the time I have been using Trend Micro, I would say it is similar to Kaspersky. Overall, I think that it's very interesting, but I wasn't really impressed with the threat protection. For example the threat in the League of Legends for the Cloud. View full review »
Find out what your peers are saying about Trend Micro, Microsoft, Symantec and others in Endpoint Encryption. Updated: May 2020.
419,794 professionals have used our research since 2012.