Try our new research platform with insights from 80,000+ expert users

Trend Micro Endpoint Encryption vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
20
Ranking in other categories
Endpoint Encryption (5th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.9
Number of Reviews
63
Ranking in other categories
Endpoint Protection Platform (EPP) (20th), Security Incident Response (1st), Endpoint Detection and Response (EDR) (15th), Ransomware Protection (4th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Trend Micro Endpoint Encryption is designed for Endpoint Encryption and holds a mindshare of 3.8%, down 5.7% compared to last year.
VMware Carbon Black Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.9% mindshare, down 2.5% since last year.
Endpoint Encryption
Endpoint Protection Platform (EPP)
 

Featured Reviews

AltafSiddiqui - PeerSpot reviewer
Though it provides good endpoint security, there is a need to improve scalability
I don't have any idea about the implementation part because the tool was configured in my company's infrastructure. When I joined the organization, everything was configured. Currently, I am involved in the endpoint management and control. My company uses the product for the endpoints in our company so that it offers protection against viruses and other malicious activities. My company operates as a service provider, owing to which we deal with multiple clients and their data, which are stored in a PDF format. My company also provides applications to our clients. There are different types of data that my company protects from malicious activities and ransomware attacks. The most beneficial part of the product for our company's security needs stems from the fact that it offers an agentless service, which makes it better to manage our endpoint devices. I am not the right person to speak about how the full disc encryption capability of Trend Micro has impacted our data protection strategies since I am not the right person to provide any information about it. I am a system engineer who manages virtualization tools like VMware. There is a separate team for endpoint management in my organization. Speaking about the user experience and management console of Trend Micro Endpoint Encryption, I would say that the product offers a very unique GUI. The unique GUI of the tool makes it possible to easily use the management console for some tasks, like creating and downloading reports. There is a separate team with six to seven engineers in my company to manage the troubleshooting part of endpoint solutions. I recommend the product to those who plan to use it. The product is easy to use. The product is useful in the area of ePO reporting. It is very easy to create general reports with the product. I rate the overall product a seven out of ten.
Matthew Weisler - PeerSpot reviewer
Great granularity for policies or applications without needing hash values
The solution is cloud based which makes it easy to use for remote devices or work-at-home situations. The solution supports full trust or signature-based approvals. You can get very granular and band out policies or applications without having to do hash values. You can band through the entire environment by execution of the name or desk IDXE. This can be achieved on the policy side because of the signature, IOC, or naming convention itself. This is very effective for pushing more blockage or removing threats across the board. The solution has a very nice API on the back end for remoting into a system and executing scripts or utilizing self automation. This is useful for monitoring several different companies in a workspace or workbook-type format. For example, I report and send out mass emails from a clickable button in an Excel workbook. The APIs all exist for each client. I push out automatic endpoint monitoring and reports every single day at a particular time, with a simple clickable button that serves as a scheduled task for fifty clients.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"We're very satisfied with Trend Micro support."
"The encryption is very good."
"The disk encryption is great."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"Very good interface."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"It actually does some heuristics, and some behavioral analysis."
"The initial setup was fairly easy."
"Behavioral Monitoring stops known malicious events before they even begin."
"The offline networking is the most important feature. Some of our users are engineers that work offsite, and they can still be on the solution, which is also great."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"I rate Carbon Black CB Defense an eight out of ten for the ease of its initial setup."
"The biggest feature out of CarbonBlack is its ability to dive in with more depth. You can look at the entire kill chain and understand, not only if an alarm or identified incident is truly a true security issue versus a false positive, and it allows us to backtrack and figure out why it actually happened and how it got into the environment."
"What I like the most about it is the dynamic grouping, where you get to group endpoints based on setup criteria. That's pretty cool. I like the simplified policy management and simplified white-listing process."
 

Cons

"Support from them was not fast."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"Should have more features of Deep Scanning"
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"They need to come up with cloud solutions."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"The product cannot perform an on-demand scan. They could add this particular feature."
"There could be more knowledge. I think they made a mistake when they took away the Check Point integration, because it provides more automation and also more threat intelligence."
"Its compatibility can be improved. It did crash a server during deployment, which is not something that I want to happen. Its deployment should also be easier. The whole deployment cycle needs to be simplified. It is an enterprise solution, and to set it up right now, you have to be an expert."
"The solution has to mature on container security and a lot of cloud environment security."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."
"But here, we hardly can take any kind of a report out of Carbon Black, so I think that should be something that should be more user-friendly."
"This solution works well but needs lots of tuning and optimization."
 

Pricing and Cost Advice

"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"You have to pay for the license annually."
"The solution's licensing costs are yearly."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"The cost is a considerable factor, but the benefit factor is the most important. When you compare it with other products, the price is high. Carbon Black will negotiate the price."
"The licensing cost is on the more expensive side, but I thought it was worth it because they did a good job. It was one of the vendors I truly didn't have to worry about too much until this latest upgrade."
"Carbon Black provides competitive pricing."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"CB Defense is available on a yearly subscription and is priced by the number of endpoints."
"The price for the solution is completely at government level, meaning one which is very high."
"The license is annual. It's a standard license."
"Overall, it was cost-effective too."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
825,399 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
13%
Computer Software Company
13%
Financial Services Firm
9%
Real Estate/Law Firm
8%
Computer Software Company
15%
Financial Services Firm
10%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Trend Micro Endpoint Encryption?
Compared to other solutions, it's neither cheap nor expensive. It offers good value for what you're paying for.
What needs improvement with Trend Micro Endpoint Encryption?
There are issues like recovery that arise. We've managed to overcome them. In some instances where the system crashes, we attempt data recovery using the Microsoft version of Encryption, and it's e...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: December 2024.
825,399 professionals have used our research since 2012.