Try our new research platform with insights from 80,000+ expert users

Symantec Endpoint Encryption vs Trend Micro Endpoint Encryption [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Symantec Endpoint Encryption
Ranking in Endpoint Encryption
3rd
Average Rating
7.6
Reviews Sentiment
6.2
Number of Reviews
38
Ranking in other categories
No ranking in other categories
Trend Micro Endpoint Encryp...
Ranking in Endpoint Encryption
6th
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Featured Reviews

KD
Security Risk Manager at a financial services firm with 10,001+ employees
Remote management capability ensures efficient security implementation for endpoints and servers
I use Symantec Endpoint Encryption for endpoint and server security. My current role involves preparing a design document for implementing security features for the product Symantec Endpoint Encryption is easy to use and manage. The solution's remote management capability is helpful, and it…
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We use it for protecting accounts, which is its most valuable feature."
"The initial setup was easy."
"The management console gives us the ability to quickly control who sees what, ensures we are on the latest version, and up-to-date."
"This product is a solid, all-in-one solution for enterprise data management."
"In general terms, it is working properly and according to our expectations. The comfort of feeling secure is the most valuable. Some customers had certain fears about changing the product because no one wants to lose any kind of information or to have some problems or inconsistencies while migrating from one product to another."
"Their cloud features such as Cloud Endpoint security, ransomware modules, malware, and other modules are very effective."
"One notable aspect is the ability to customize alerts and other settings."
"Disk encryption and file and folder encryption are the most valuable and used features. It is also very well integrated with Symantec Messaging Gateway and Symantec DLP, which is helpful in protecting any kind of information that goes outside. Symantec DLP catches an email and sends it to the encryption server. The encryption server encrypts the email and intimates to the user that confidential information is being sent out. The administrator can then take appropriate action."
"Offers very good endpoint security solutions."
"Overall, I think that it's very interesting."
"Very good interface."
"One valuable feature is full disk encryption."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"The solution is good overall. All of its features are good."
"Fast encryption feature."
 

Cons

"The agent can be improved on the solution. Right now, we have an Endpoint Protection agent as well as an encryption agent and another for the DLVs and other services. We would prefer a single agent for the entire product."
"What I didn't find helpful in the version we used is the fact that all devices had to be on the same network for us to push through the encryption."
"From an administration point of view, maybe it would be ideal to have it centrally managed."
"I would like to have less frequent updates."
"The UI could be improved."
"The solution presently doesn't let network folder encryption be done on Macintosh."
"There are some issues with the single sign-on with the active directory. We had a few problems related to the synchronization between the active directory and the login features of the Symantec products because the users made many password changes during the day. The time for synchronization with the solutions can be improved. I would like to see mobile encryption. There should be a possibility to include all the mobiles of a company in the console. Many customers are asking about encryptions for tablets or cell phones, but we don't have any product that we are comfortable with to recommend to our customers."
"It was hard to install and took us about three months."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"I would like to improve the solution's support."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"The product's scalability is an area of concern where improvements are required."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"Support from them was not fast."
"Should have more features of Deep Scanning"
"It would be great if this solution had support for file integrity monitoring."
 

Pricing and Cost Advice

"The cost of this solution is a little on the higher side."
"The solution is good, but it is more expensive than other solutions in the market. Other solutions, such as BitLocker are less expensive."
"Considering the fluctuation in exchange rates in our part of the world, we find it generally affordable."
"The license is not very expensive."
"The pricing is fair but there is variability in our area that needs to be addressed."
"It can be expensive. However, if you plan to scale or are at a large enterprise company, this product could be what you need."
"Although the performance and stability of this solution are good, our challenge is the price tag. You buy the solution once, but you also have to keep on buying the licenses yearly."
"The licensing costs yearly are $5000."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
883,044 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Manufacturing Company
9%
Marketing Services Firm
7%
Government
6%
Performing Arts
15%
Manufacturing Company
12%
Marketing Services Firm
8%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business19
Midsize Enterprise7
Large Enterprise16
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

How does Microsoft BitLocker compare with Symantec Endpoint Encryption?
Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and it successfully fulfills regulatory needs in terms of data protecti...
What do you like most about Symantec Endpoint Encryption?
Antivirus, URL filtering, and firewall protection are the most effective features for data protection.
What is your experience regarding pricing and costs for Symantec Endpoint Encryption?
I am not sure about the pricing and licensing cost of Symantec Endpoint Encryption.
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
 

Also Known As

Symantec Drive Encryption
No data available
 

Overview

 

Sample Customers

Citrix Systems Inc., City of Lansing, Commercial & Industrial Property, France T_l_visions, Fujian Mobile Co. Ltd., Group Lotus plc, Hall Booth Smith & Slover, P.C. (HBSS), Portugal Telecom, PostFinance, Public Pension Agency
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: February 2026.
883,044 professionals have used our research since 2012.