Try our new research platform with insights from 80,000+ expert users

Symantec Endpoint Encryption vs Trend Micro Endpoint Encryption [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Symantec Endpoint Encryption
Average Rating
7.6
Reviews Sentiment
6.2
Number of Reviews
38
Ranking in other categories
Endpoint Encryption (3rd)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Featured Reviews

KD
Security Risk Manager at a financial services firm with 10,001+ employees
Remote management capability ensures efficient security implementation for endpoints and servers
I use Symantec Endpoint Encryption for endpoint and server security. My current role involves preparing a design document for implementing security features for the product Symantec Endpoint Encryption is easy to use and manage. The solution's remote management capability is helpful, and it…
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the ease of use."
"The solution was used to find harmful files and viruses on laptops."
"It has reduced the number of incidents related to the loss of information."
"The most effective features of Symantec are those related to data protection."
"You get updates and other encrypted files easily."
"We have been very satisfied with the solution's security capabilities."
"Symantec Endpoint Encryption is a very good product, easy to use with remote management capabilities."
"In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"The solution is good overall. All of its features are good."
"The most valuable feature of the solution is the antivirus part it offers."
"We're very satisfied with Trend Micro support."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"Fast encryption feature."
"The encryption is very good."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
 

Cons

"I would like them to have integration with a wider range of non-Symantec products."
"I do not find the environment to be very user-friendly."
"I would like to see some features or functionality enhanced in Symantec Endpoint Encryption."
"We would like some advanced security protection features."
"It was hard to install and took us about three months."
"The solution does slow down the device a little bit, once it's installed."
"What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."
"The solution does not have endpoint control."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"There are scalability limitations. I'd rate scalability five out of ten."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"Integration and support could be improved."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"It is not easy to integrate with third party solutions."
"It would be great if this solution had support for file integrity monitoring."
"There are recovery issues that arise."
 

Pricing and Cost Advice

"The pricing is fair but there is variability in our area that needs to be addressed."
"The solution is good, but it is more expensive than other solutions in the market. Other solutions, such as BitLocker are less expensive."
"We hold an annual license, and their pricing is competitive, falling into the affordable range."
"Considering the fluctuation in exchange rates in our part of the world, we find it generally affordable."
"Although the performance and stability of this solution are good, our challenge is the price tag. You buy the solution once, but you also have to keep on buying the licenses yearly."
"The cost of this solution is a little on the higher side."
"There is a license required for this solution."
"The license is not very expensive."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"The solution's licensing costs are yearly."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"You have to pay for the license annually."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
883,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Manufacturing Company
10%
Marketing Services Firm
7%
Government
6%
Performing Arts
15%
Manufacturing Company
12%
Marketing Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise7
Large Enterprise16
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
What do you like most about Symantec Endpoint Encryption?
Antivirus, URL filtering, and firewall protection are the most effective features for data protection.
What is your experience regarding pricing and costs for Symantec Endpoint Encryption?
I am not sure about the pricing and licensing cost of Symantec Endpoint Encryption.
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
 

Also Known As

Symantec Drive Encryption
No data available
 

Overview

 

Sample Customers

Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: February 2026.
883,760 professionals have used our research since 2012.