Try our new research platform with insights from 80,000+ expert users

Microsoft BitLocker vs Trend Micro Endpoint Encryption comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Microsoft BitLocker
Ranking in Endpoint Encryption
1st
Average Rating
8.2
Reviews Sentiment
7.9
Number of Reviews
64
Ranking in other categories
Mobile Data Protection (1st)
Trend Micro Endpoint Encryp...
Ranking in Endpoint Encryption
4th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
20
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2024, in the Endpoint Encryption category, the mindshare of Microsoft BitLocker is 41.0%, up from 39.7% compared to the previous year. The mindshare of Trend Micro Endpoint Encryption is 3.9%, down from 5.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Encryption
 

Featured Reviews

Douglas Curry - PeerSpot reviewer
Users can easily deploy and manage it
The solution's most valuable feature is that it is simple to deploy and manage. I can't say what features of the tool I like since it is very much a deploy-and-forget product. We don't use any advanced features of the tool in my company. The tool's recovery options are good, especially since it integrates with Active Directory, making everything a simple process. The product's integration capabilities are good.
AltafSiddiqui - PeerSpot reviewer
Though it provides good endpoint security, there is a need to improve scalability
I don't have any idea about the implementation part because the tool was configured in my company's infrastructure. When I joined the organization, everything was configured. Currently, I am involved in the endpoint management and control. My company uses the product for the endpoints in our company so that it offers protection against viruses and other malicious activities. My company operates as a service provider, owing to which we deal with multiple clients and their data, which are stored in a PDF format. My company also provides applications to our clients. There are different types of data that my company protects from malicious activities and ransomware attacks. The most beneficial part of the product for our company's security needs stems from the fact that it offers an agentless service, which makes it better to manage our endpoint devices. I am not the right person to speak about how the full disc encryption capability of Trend Micro has impacted our data protection strategies since I am not the right person to provide any information about it. I am a system engineer who manages virtualization tools like VMware. There is a separate team for endpoint management in my organization. Speaking about the user experience and management console of Trend Micro Endpoint Encryption, I would say that the product offers a very unique GUI. The unique GUI of the tool makes it possible to easily use the management console for some tasks, like creating and downloading reports. There is a separate team with six to seven engineers in my company to manage the troubleshooting part of endpoint solutions. I recommend the product to those who plan to use it. The product is easy to use. The product is useful in the area of ePO reporting. It is very easy to create general reports with the product. I rate the overall product a seven out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Microsoft BitLocker is a Microsoft native product that provides good encryption."
"Microsoft BitLocker's most valuable features are stability and simplicity in terms of usage."
"I like the simplicity and ease of use of this solution."
"The most valuable feature is the authentication process which is very fast."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"Whole Disk Encryption is great. BitLocker runs seamlessly during boot up."
"The manageability of it is a valuable feature."
"It holds significant value as it reduces the need for extensive IT management to handle security across networks and environments"
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The most valuable feature is the support for email."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The disk encryption is great."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"Overall, I think that it's very interesting."
"Offers very good endpoint security solutions."
 

Cons

"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"The solution’s user interface could be improved."
"Technical support has not been very good."
"It would be good if Microsoft offered improved recovery options or if it could automate the recovery options a bit."
"The deployment process regarding prerequisites and automation could be easy to understand."
"I would recommend BitLocker only because of the economic side, not the technical side. If the features were included in the already existing licenses I would use it. If not, I would recommend other products."
"It is not good for cross-compatibility, so our Mac users are not able to use it."
"The product must improve the centralization of keys."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"Should have more features of Deep Scanning"
"There are recovery issues that arise."
"Integration and support could be improved."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"They need to come up with cloud solutions."
"The product's scalability is an area of concern where improvements are required."
 

Pricing and Cost Advice

"On a scale from one to ten, where one is expensive and ten is cheap, I rate the solution's pricing an eight out of ten."
"For reasons unknown, Microsoft products seem to be getting more expensive."
"This solution is included with Microsoft Server and my clients did not have to pay for anything extra."
"The solution is priced low. I would rate the product's pricing one out of ten."
"I think it's reasonably priced because I've never heard any complaints from my company about its costs."
"The solution is expensive."
"We can activate the product at no cost."
"The price of this solution should be more competitive."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The solution's licensing costs are yearly."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"You have to pay for the license annually."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Government
10%
Manufacturing Company
8%
Financial Services Firm
8%
Government
13%
Computer Software Company
13%
Financial Services Firm
9%
Real Estate/Law Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What should one take into account when replacing PGP with Microsoft BitLocker?
Beware to make backup of useful data, then use reverse decryption policy from Symantec panel/McAfee ePO to decrypt the DE partitions while it is sometimes more straightforward and faster to reinsta...
Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection....
How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
What is your experience regarding pricing and costs for Trend Micro Endpoint Encryption?
Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.
What needs improvement with Trend Micro Endpoint Encryption?
There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes, we attempt data recovery using the Microsoft version of Encryption, and it's e...
 

Also Known As

BitLocker, MS BitLocker
No data available
 

Overview

 

Sample Customers

ACV, Proaxis Therapy, Choice Hotels International, adnymics GmbH, Intermedia, NMBS/SNCB
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft BitLocker vs. Trend Micro Endpoint Encryption and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.