Logo of Trend Micro Endpoint Encryption

Trend Micro Endpoint Encryption

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
2% decrease in the last year
Web traffic
9% increase in the last quarter

Ratings

G2
4.2/5
(34)

Trend Micro Endpoint Encryption description

Trend Micro Endpoint Encryption protects sensitive data on company computers and devices like laptops, desktops and USB drives. It does this by using encryption, which makes the data unreadable without the proper key. This helps prevent unauthorized access to confidential information even if a device is lost or stolen. It offers different levels of encryption, covering entire disks, specific files or folders, and even removable media. Trend Micro Endpoint Encryption is managed through a central console, making it easier for IT administrators to set policies and monitor compliance.


Who is Trend Micro Endpoint Encryption best for

Trend Micro Endpoint Encryption secures sensitive data on company computers and devices, including laptops, desktops, and USB drives. It offers full-disk, file/folder, and removable media encryption, managed through a central console. Praised for its strong encryption and centralized management, some users find the interface outdated and resource-intensive. Ideal for businesses with remote workers handling sensitive data needing robust endpoint protection.

  • Best for small to mid-sized businesses needing endpoint encryption.

  • Suitable for any industry handling sensitive data requiring endpoint protection.


Trend Micro Endpoint Encryption features

Type in the name of the feature or in your own words tell us what you need
Supported

Trend Micro Endpoint Encryption supports full disk encryption, enabling encryption of the entire hard drive.

Supported

Trend Micro Endpoint Encryption offers centralized encryption management via its management console.

Supported

Trend Micro Endpoint Encryption encrypts USB drives, CDs, and DVDs.

Supported

Trend Micro Endpoint Encryption integrates with Active Directory for user authentication and management via LDAP.

Supported

Trend Micro Endpoint Encryption supports encrypting specific files or folders.

Supported

Endpoint Encryption allows remote wipe and lock of devices.

Supported

Trend Micro Endpoint Encryption supports pre-boot authentication via its Full Disk Encryption feature.


Trend Micro Endpoint Encryption reviews

We've summarised 34 Trend Micro Endpoint Encryption reviews (Trend Micro Endpoint Encryption G2 reviews) and summarised the main points below.

Pros of Trend Micro Endpoint Encryption
  • Easy to deploy, configure, and maintain.
  • Strong data protection and encryption capabilities.
  • Centralized management console simplifies administration.
  • Effective pre-boot environment for key management, avoiding TPM chip issues.
  • Seamless integration with Active Directory.
  • Offers various encryption levels (full disk, file/folder, removable media).
  • Good customer support.
  • Simple and intuitive user experience (for some users).
  • Keeps customer and company information secure.
  • Reliable and runs smoothly (for most users).
Cons of Trend Micro Endpoint Encryption
  • High resource usage reported by some users.
  • Lacks Linux compatibility.
  • Management interface feels outdated and clunky.
  • Difficult OS upgrades for encrypted machines.
  • No SaaS offering for the management server.
  • Automatic removal of computers from Active Directory is missing.
  • Granular control for external storage devices needed.
  • Complicated data recovery process.
  • Password sync issues, especially for remote users.
  • Initial setup can be confusing.

Trend Micro Endpoint Encryption alternatives

  • Logo of ArmorCode
    ArmorCode
    Focuses on application security and vulnerability management using a consolidated dashboard, rather than device-level encryption. It has significantly more momentum currently. An ArmorCode alternative is Trend Micro Endpoint Encryption for device-level data protection.
    Read more
  • Logo of Endpoint Protector by CoSoSys
    Endpoint Protector by CoSoSys
    Better fit for medium-sized companies. Offers data loss prevention (DLP) and device control. Has broader OS compatibility including Linux. Endpoint Protector is a strong Trend Micro Endpoint Encryption competitor and alternative.
    Read more
  • Logo of Symantec Endpoint Security
    Symantec Endpoint Security
    Better fit for enterprise companies. Broader industry fit, especially for regulated industries like Healthcare, Finance, and Government. Focuses on core endpoint protection like antivirus and firewall, not encryption. Has significantly more website traffic growth but less employee growth. Users appreciate the robust protection but dislike high resource usage and complex interface.
    Read more
  • Logo of Kaseya VSA
    Kaseya VSA
    Better fit for IT departments and MSPs. Broader industry fit, especially for Software, IT & Telecommunications. Provides endpoint and network management tools.
    Read more
  • Logo of N-able N-Sight RMM
    N-able N-Sight RMM
    Better for IT management, patching, and remote access. A strong Trend Micro Endpoint Encryption alternative for MSPs and IT departments supporting SMEs. Lacks data encryption features.
    Read more
  • Logo of McAfee Device Control
    McAfee Device Control
    Better for medium-sized companies. Focuses on preventing data loss via device control, rather than full-disk encryption. More granular device control features.
    Read more

Trend Micro Endpoint Encryption FAQ

  • What is Trend Micro Endpoint Encryption and what does Trend Micro Endpoint Encryption do?

    Trend Micro Endpoint Encryption secures sensitive data on computers and devices like USB drives through encryption, preventing unauthorized access even if a device is lost or stolen. It offers full-disk, file/folder, and removable media encryption, managed centrally for easy policy enforcement and compliance monitoring.

  • How does Trend Micro Endpoint Encryption integrate with other tools?

    Trend Micro Endpoint Encryption integrates with Active Directory for user authentication and management via LDAP. It also supports pre-boot authentication through its Full Disk Encryption feature, enhancing security before the operating system loads.

  • What the main competitors of Trend Micro Endpoint Encryption?

    Alternatives to Trend Micro Endpoint Encryption include Endpoint Protector by CoSoSys, Symantec Endpoint Security, McAfee Device Control, and others. These competitors offer similar endpoint encryption and data loss prevention capabilities.

  • Is Trend Micro Endpoint Encryption legit?

    Trend Micro Endpoint Encryption is a legitimate security solution designed to protect sensitive data. It offers strong encryption capabilities, centralized management, and various encryption levels. However, some users have reported high resource usage and a clunky interface.

  • How much does Trend Micro Endpoint Encryption cost?

    Trend Micro doesn't publicly disclose pricing for Endpoint Encryption. Contact their sales team for a quote tailored to your specific endpoint security needs and to determine if the product is worth the investment.

  • Is Trend Micro Endpoint Encryption customer service good?

    Customer reviews indicate positive experiences with Trend Micro Endpoint Encryption's customer support. Users mentioned helpful support during endpoint implementation and praised the overall ease of use and implementation of the software.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.