2019-11-13T05:28:00Z

What is your primary use case for Trend Micro Endpoint Encryption?

Miriam Tover - PeerSpot reviewer
  • 0
  • 4
PeerSpot user
14

14 Answers

AltafSiddiqui - PeerSpot reviewer
Real User
Top 10
2024-02-13T08:15:54Z
Feb 13, 2024

I use the solution in my company for security purposes. The tool is used for endpoint security on our organization's laptop. My company also uses the DLP protection part for the inbound and outbound management of data.

Search for a product comparison
NI
Real User
Top 20
2023-12-20T16:28:00Z
Dec 20, 2023

The solution is used for the user's laptop encryption, for antivirus, updates and controlling the upgrades of Windows and Office.

sheik abdul kader  - PeerSpot reviewer
Reseller
Top 10
2023-12-20T15:20:00Z
Dec 20, 2023

We have multiple clients, some clients use Sophos Endpoint Solution, and some even like to use Check Point Harmony. But comparatively, Trend Micro Endpoint Encryption is much better than these other solutions. This solution is being used by us for the baking sector, but mainly we are dealing with government entities, as well as the military environment.

MM
Real User
Top 20
2023-10-05T15:11:31Z
Oct 5, 2023

In my company, Trend Micro Endpoint Encryption serves as an antivirus solution.

RK
Real User
Top 5
2023-06-12T10:13:00Z
Jun 12, 2023

We use the solution for data encryption.

TS
Real User
Top 5Leaderboard
2023-02-13T20:29:38Z
Feb 13, 2023

We primarily use the solution for encryption. If there is sensitive organizational data, they use encryption to protect it from threats. This way, people can't misuse the data.

Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,319 professionals have used our research since 2012.
Sunil  Kumar - PeerSpot reviewer
Real User
Top 5
2023-01-18T02:09:48Z
Jan 18, 2023

Our customers are using this solution on a daily basis. We have deployed this solution on-premise and on the cloud. We have clients in many countries in the world, such as the USA and India.

NS
Real User
Top 5
2022-11-28T10:43:21Z
Nov 28, 2022

We primarily use the solution for endpoint encryption. It's used on devices such as desktops and laptops.

LaithQuraam - PeerSpot reviewer
Real User
Top 20
2022-07-20T10:46:42Z
Jul 20, 2022

Trend Micro Endpoint Encryption is used for our endpoints.

Nadeem Syed - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-04-25T09:34:27Z
Apr 25, 2022

We use encryption to secure data and devices. In case you lose your device or your data, this is a major feature that covers everything through encryption.

BG
Real User
2021-09-17T09:51:00Z
Sep 17, 2021

There are basically two ways it can be deployed. It can be deployed in the cloud or it can be deployed in your endpoint. All your endpoints can be encrypted in the firewall and all your files can be encrypted and stored in the cloud if it is a cloud deployment.

AP
Real User
Top 20
2021-06-07T13:28:00Z
Jun 7, 2021

We utilize the latest version. The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment. It also protects us from cyber attacks and malware.

SB
Real User
2020-01-26T09:26:00Z
Jan 26, 2020

Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior analysis to track all of the malware and other threats that come in. We do research on them and publish advisories. We then create the list of IoCs for the endpoint, fully with the help of Trend Micro solutions. We are monitoring the web and also using user-based use cases. If a user is trying to access any malicious sites then it triggers an alert. At this point, we do immediate remediation for that and the system is isolated from the network. With that system out of the way, we can analyze and repair the problem.

AA
Real User
2019-11-13T05:28:00Z
Nov 13, 2019

Currently, we are with Trend Micro as an antivirus solution and as our long-term plan to upgrade our solution to cover deep security services. So we plan to have it as not only the antivirus but as a complete endpoint security solution. Trend Micro has a very good knowledge base. Even with the extensive history of issues available with Microsoft and all the other companies, you will find that the first group to discover and document the issues is Trend Micro. They have a big knowledge base and a big team working to offer this solution. There are a lot of companies available on the market providing similar solutions, but you cannot compare them with Trend Micro as far as depth and disclosure.

Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting...
Download Trend Micro Endpoint Encryption ReportRead more