Try our new research platform with insights from 80,000+ expert users

Trend Micro Endpoint Encryption vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Endpoint Protection Platform (EPP) (37th), Security Incident Response (6th), Endpoint Detection and Response (EDR) (30th), Ransomware Protection (8th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Trend Micro Endpoint Encryption is designed for Endpoint Encryption and holds a mindshare of 3.5%, down 3.8% compared to last year.
VMware Carbon Black Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.8% mindshare, down 1.9% since last year.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.5%
Microsoft BitLocker23.6%
ESET Endpoint Encryption11.7%
Other61.2%
Endpoint Encryption
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
VMware Carbon Black Endpoint1.8%
Microsoft Defender for Endpoint8.1%
CrowdStrike Falcon7.0%
Other83.1%
Endpoint Protection Platform (EPP)
 

Featured Reviews

VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The disk encryption is great."
"The most valuable feature of the solution is the antivirus part it offers."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"We use the solution for data encryption."
"One valuable feature is full disk encryption."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"The encryption is very good."
"The solution is good overall. All of its features are good."
"The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance."
"The product's most valuable feature is its ability to be fully integrated with the VMware environment."
"Technical support is excellent."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"The software uses very few resources; it is almost invisible to the end user."
"It actually does some heuristics, and some behavioral analysis."
"The most valuable feature of the solution stems from the support it provides."
 

Cons

"When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"Support from them was not fast."
"It would be great if this solution had support for file integrity monitoring."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"At this point, we're test-bedding several other providers right now to see if there's anything that does equally or better and that comes at a better price point."
"Its compatibility can be improved. It did crash a server during deployment, which is not something that I want to happen. Its deployment should also be easier. The whole deployment cycle needs to be simplified. It is an enterprise solution, and to set it up right now, you have to be an expert."
"The product's stability could be improved."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"It would be nice to have additional forensic tools that you can build into the back end."
"I would like to see the user credentials feature improved. I would also like to see more reporting features and better ways to roll the reports out."
"There is room for improvement in the support and service team."
"The solution needs expanded endpoint query tools."
 

Pricing and Cost Advice

"You have to pay for the license annually."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"The solution's licensing costs are yearly."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"The license is annual. It's a standard license."
"The price for the solution is completely at government level, meaning one which is very high."
"The pricing [is] more or less the same as other similar solutions."
"The platform is expensive."
"The licensing cost is on the more expensive side, but I thought it was worth it because they did a good job. It was one of the vendors I truly didn't have to worry about too much until this latest upgrade."
"We have branches, we have different companies, but we cannot buy less than 100 licenses. This does not make sense to me... It should be more flexible. I can understand their saying, "Okay, to be a customer you need 100," but to add on to that number it should be something very straightforward. If I need to add five, for example, I shouldn't need to add 100."
"The pricing is annually based and operates through another department than mine."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
880,901 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Performing Arts
17%
Manufacturing Company
11%
Government
8%
Comms Service Provider
5%
Financial Services Firm
12%
Government
9%
Computer Software Company
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

What needs improvement with Trend Micro Endpoint Encryption?
If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution.
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: January 2026.
880,901 professionals have used our research since 2012.