We performed a comparison between Microsoft BitLocker and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like the fact that you can get a BitLocker encryption key out of OneDrive."
"Integration with System Center Configuration Manager (C: and D: logical drives are encrypted before installing Windows via SCCM)."
"The tool is stable."
"The product is stable."
"Whole Disk Encryption is great. BitLocker runs seamlessly during boot up."
"The ease of administering and integrating the solution is great."
"It's my understanding that the initial setup is straightforward."
"Being able to encrypt an entire hard disk has been most valuable."
"The encryption is very good."
"Very good interface."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"We use the solution for data encryption."
"The product's initial setup phase is easy, considering the management console and software."
"The solution is good overall. All of its features are good."
"The most valuable feature of the solution is the antivirus part it offers."
"Offers very good endpoint security solutions."
"I often have to make multiple attempts to log in."
"The solution’s user interface could be improved."
"In future releases, I would like to see a feature where I can have a view of each device that has BitLocker to see if these machines are encrypted or not. So, I just want a view or a dashboard that can tell us so that I can remediate and add BitLocker to those systems or devices."
"It's possible that the time it takes to pull items in to BitLocker could be reduced a bit."
"The solution could be improved if it was more user friendly."
"Microsoft BitLocker needs to be an all-inclusive solution. For example, a Trusted Platform Module (TPM) cryptoprocessor is required to use Bitlocker with your computer which keeps Bitlocker from adoption beyond Windows."
"BitLocker should be available on standard Windows. We need to spend money on a Pro license to get BitLocker because it's essential to protect our customers' data. We don't want that to fall into the wrong hands."
"The initial setup is complex."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"The product's scalability is an area of concern where improvements are required."
"It is not easy to integrate with third party solutions."
"It would be great if this solution had support for file integrity monitoring."
"There are recovery issues that arise."
"Integration and support could be improved."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
More Trend Micro Endpoint Encryption Pricing and Cost Advice →
Microsoft BitLocker is ranked 1st in Endpoint Encryption with 61 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 20 reviews. Microsoft BitLocker is rated 8.2, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Microsoft BitLocker writes "A solution that prevents unauthorized access and goes beyond security measures to provide protection to its users". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Used for mobile device protection with moderate pricing". Microsoft BitLocker is most compared with ESET Endpoint Encryption, Symantec Endpoint Encryption, McAfee Complete Data Protection, WinMagic SecureDoc and Sophos SafeGuard, whereas Trend Micro Endpoint Encryption is most compared with Sophos SafeGuard, VMware Carbon Black Endpoint and McAfee Complete Data Protection. See our Microsoft BitLocker vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.