Try our new research platform with insights from 80,000+ expert users

Symantec Endpoint Encryption vs Trend Micro Endpoint Encryption [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Symantec Endpoint Encryption
Average Rating
7.6
Reviews Sentiment
6.2
Number of Reviews
38
Ranking in other categories
Endpoint Encryption (3rd)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Featured Reviews

KD
Security Risk Manager at a financial services firm with 10,001+ employees
Remote management capability ensures efficient security implementation for endpoints and servers
I use Symantec Endpoint Encryption for endpoint and server security. My current role involves preparing a design document for implementing security features for the product Symantec Endpoint Encryption is easy to use and manage. The solution's remote management capability is helpful, and it…
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We can extend it to all of the critical endpoints and the servers, and we can ensure the confidentiality of the data."
"The solution was used to find harmful files and viruses on laptops."
"Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
"Symantec Endpoint Encryption is a very good product, easy to use with remote management capabilities."
"It has reduced the number of incidents related to the loss of information."
"I like the management aspect of this solution. You don't want to have end-users tweak or set it themselves, so the fact that you could do it from a central point helped us a lot."
"This product is a solid, all-in-one solution for enterprise data management."
"The most effective features of Symantec are those related to data protection."
"We're very satisfied with Trend Micro support."
"Overall, I think that it's very interesting."
"The disk encryption is great."
"One valuable feature is full disk encryption."
"It's a secure and quick solution."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
"Very good interface."
"Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues."
 

Cons

"The product can be expensive. Price was a factor in moving away from the product."
"The instability of the company and lack of presence in the Middle East is affecting product use."
"There are other solutions in the market that have new features. The feature could improve."
"It was hard to install and took us about three months."
"The solution does slow down the device a little bit, once it's installed."
"Its remote deployment should be improved. Currently, there is no remote deployment for Symantec Endpoint Encryption. You have to install it manually. There are some issues with AD integration and the time taken to reflect a password on the Endpoint Encryption Manager when a new user has changed the password, but they are already working on these issues, and these will be resolved in the next release."
"It's a bit difficult to get good support. Their response times are really bad."
"One feature that is lacking is integration with Symantec Information Centric (ICT). As it is now, I don't see how to integrate the encryption with ICT, and in my opinion this is an area that certainly requires encryption, even though it's no longer supported by Broadcom."
"There are scalability limitations. I'd rate scalability five out of ten."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"I would like to improve the solution's support."
"When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working."
"There are recovery issues that arise."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
 

Pricing and Cost Advice

"Considering the fluctuation in exchange rates in our part of the world, we find it generally affordable."
"They have two solutions for encryption including Symantec Endpoint Encryption and PGP Endpoint Encryption. With one PGP license, you can deploy the two solutions. The PGP license gives you two options."
"Although the performance and stability of this solution are good, our challenge is the price tag. You buy the solution once, but you also have to keep on buying the licenses yearly."
"The solution is good, but it is more expensive than other solutions in the market. Other solutions, such as BitLocker are less expensive."
"The cost of this solution is a little on the higher side."
"We hold an annual license, and their pricing is competitive, falling into the affordable range."
"It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need."
"Depending on how many modules you will use (up to five) the licensing will be more expensive."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
884,122 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Manufacturing Company
10%
Marketing Services Firm
7%
Government
6%
Performing Arts
15%
Manufacturing Company
12%
Marketing Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise7
Large Enterprise16
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
What do you like most about Symantec Endpoint Encryption?
Antivirus, URL filtering, and firewall protection are the most effective features for data protection.
What is your experience regarding pricing and costs for Symantec Endpoint Encryption?
I am not sure about the pricing and licensing cost of Symantec Endpoint Encryption.
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
 

Also Known As

Symantec Drive Encryption
No data available
 

Overview

 

Sample Customers

Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: February 2026.
884,122 professionals have used our research since 2012.