Try our new research platform with insights from 80,000+ expert users

ESET Endpoint Encryption vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET Endpoint Encryption
Ranking in Endpoint Encryption
3rd
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
15
Ranking in other categories
No ranking in other categories
Trend Micro Endpoint Encryp...
Ranking in Endpoint Encryption
6th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
21
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2025, in the Endpoint Encryption category, the mindshare of ESET Endpoint Encryption is 15.1%, down from 17.5% compared to the previous year. The mindshare of Trend Micro Endpoint Encryption is 3.4%, down from 4.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
ESET Endpoint Encryption15.1%
Trend Micro Endpoint Encryption3.4%
Other81.5%
Endpoint Encryption
 

Featured Reviews

Roman Danel - PeerSpot reviewer
Performs well, does not slow down the computer, and protects emails
The quality of protection is very important. The tool must also not slow down the computer. The quality of the user interface and the way the solution is updated must also be considered. The updates depend on certain situations. People who want to use the solution must check how it is working, check the memory, and the processes that are run. We must check if there are any unwanted features. For example, some antivirus tools install other services that are not necessary, and they are frequently updated. It won’t be a problem for a user who has a computer with more RAM, but it will be difficult to use it on an old computer with less RAM. The IT department uses remote features. Sometimes, they change some configurations remotely. Overall, I rate the tool a nine out of ten.
Sampath Acharya - PeerSpot reviewer
Full disk encryption safeguards data effectively and customer service provides excellent support
There weren't too many challenges with the setup. The initial setup is a little bit difficult as it requires skill. A person without the necessary experience or skill cannot handle it. Overall, I'd rate the implementation process seven out of ten. Deployment times vary depending on customer enrollment. If there are more than 100 machines, it might take 45 to 60 days.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"I have used it in the past because it works quite well for encryption."
"ESET Endpoint Encryption works as an antivirus system."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The product is easy to implement and configure."
"The initial setup is easy."
"The setup is getting easier."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"The solution is good overall. All of its features are good."
"Offers very good endpoint security solutions."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The disk encryption is great."
"Overall, I think that it's very interesting."
"The most valuable feature of the solution is the antivirus part it offers."
"The encryption is very good."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
 

Cons

"ESET Endpoint Encryption needs to improve pricing and security."
"There could be an option for users to restart the system without a password."
"I would like to see better compatibility with mobile devices."
"If you have issues with your network, you can't get updates, which is a problem."
"The overall compatibility of the device is an area where the solution lacks."
"From an admin perspective, the solution's UI could be more user-friendly."
"My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem."
"Integration with central management needs improvement."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"There are recovery issues that arise."
"The product's scalability is an area of concern where improvements are required."
"They need to come up with cloud solutions."
"Should have more features of Deep Scanning"
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"I would like to improve the solution's support."
 

Pricing and Cost Advice

"The National University System dedicates 500 of their 5000 licenses to us, which is $14/yr per device. Most companies are paying $99 or $120 per device a year."
"Instead of installing ESET on each machine at each location, we just do it remotely. This has been a time saver for us."
"On a scale of one to ten, where one is the lowest and ten is the highest, I rate its pricing a two."
"We paid for an annual subscription, and it was reasonable."
"The pricing is mid-ranged and could be more cost-effective."
"Licensing costs are on a yearly basis."
"ESET Endpoint Encryption is moderately priced."
"There are some inexpensive products compared to ESET Endpoint Encryption, but they lack the essential features."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
873,085 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Comms Service Provider
13%
Government
8%
Retailer
7%
Performing Arts
17%
Government
10%
Manufacturing Company
8%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise5
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise4
 

Questions from the Community

What needs improvement with ESET Endpoint Encryption?
My problem is that there's a technical glitch and they don't have a fix for it. It's not working with the latest version of Windows, which is a problem. My hands are kind of tied.
What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
 

Overview

 

Sample Customers

CCS Media Limited, Mercury Engineering, Unigarant, Pinewood Healthcare
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about ESET Endpoint Encryption vs. Trend Micro Endpoint Encryption and other solutions. Updated: September 2025.
873,085 professionals have used our research since 2012.