Try our new research platform with insights from 80,000+ expert users

ESET Endpoint Encryption vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET Endpoint Encryption
Ranking in Endpoint Encryption
3rd
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
No ranking in other categories
Trend Micro Endpoint Encryp...
Ranking in Endpoint Encryption
6th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Endpoint Encryption category, the mindshare of ESET Endpoint Encryption is 18.8%, up from 14.3% compared to the previous year. The mindshare of Trend Micro Endpoint Encryption is 3.1%, down from 4.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption
 

Featured Reviews

Lucky  Lushaba - PeerSpot reviewer
Has an user-friendly UI which even a non-technical person can use
The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems.
Sampath Acharya - PeerSpot reviewer
Full disk encryption safeguards data effectively and customer service provides excellent support
There weren't too many challenges with the setup. The initial setup is a little bit difficult as it requires skill. A person without the necessary experience or skill cannot handle it. Overall, I'd rate the implementation process seven out of ten. Deployment times vary depending on customer enrollment. If there are more than 100 machines, it might take 45 to 60 days.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This solution can be centrally managed."
"The tool does not slow down the computer."
"The most valuable feature is that everything is done on the server."
"I have used it in the past because it works quite well for encryption."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"It's a secure and quick solution."
"Fast encryption feature."
"Overall, I think that it's very interesting."
"The product's initial setup phase is easy, considering the management console and software."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"We use the solution for data encryption."
"The most valuable feature is the support for email."
 

Cons

"The overall compatibility of the device is an area where the solution lacks."
"Integration with central management needs improvement."
"There should be more frequent updates."
"ESET Endpoint Encryption needs to improve pricing and security."
"The product should be more responsive regarding feedback if it detects something in our infrastructure. I believe there's a backend that their engineers use to detect viruses in our system. We would appreciate it if they could promptly provide feedback and give us recommendations on how to better protect our infrastructure beyond their system. Additionally, we hope for improved integration with the other systems we currently use. It would be beneficial if they could collaborate to create something that facilitates integration between these systems."
"There could be an option for users to restart the system without a password."
"Sometimes the server console is very slow, so the performance could be improved."
"From an admin perspective, the solution's UI could be more user-friendly."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"Integration and support could be improved."
"The product's scalability is an area of concern where improvements are required."
"It is not easy to integrate with third party solutions."
"I would like to improve the solution's support."
 

Pricing and Cost Advice

"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"ESET Endpoint Encryption is moderately priced."
"The pricing is mid-ranged and could be more cost-effective."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"We paid for an annual subscription, and it was reasonable."
"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"Licensing costs are on a yearly basis."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"You have to pay for the license annually."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"The solution's licensing costs are yearly."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Comms Service Provider
13%
Government
8%
Retailer
8%
Government
16%
Computer Software Company
9%
Financial Services Firm
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem. My hands are kind of tied.
What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
 

Overview

 

Sample Customers

CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about ESET Endpoint Encryption vs. Trend Micro Endpoint Encryption and other solutions. Updated: July 2025.
861,524 professionals have used our research since 2012.