Try our new research platform with insights from 80,000+ expert users

Trend Micro Endpoint Encryption [EOL] vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Endpoint Protection Platform (EPP) (38th), Security Incident Response (7th), Endpoint Detection and Response (EDR) (36th), Ransomware Protection (8th)
 

Featured Reviews

VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"We use the solution for data encryption."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
"The product's initial setup phase is easy, considering the management console and software."
"The most valuable feature of the solution is the antivirus part it offers."
"One valuable feature is full disk encryption."
"The solution is good overall. All of its features are good."
"Very good interface."
"The most valuable feature of the solution stems from the fact that it is one of the best EDR tools in the market."
"The product's most valuable feature is its ability to be fully integrated with the VMware environment."
"There's lots of very useful documentation online to help troubleshoot and learn about the product."
"The biggest feature out of CarbonBlack is its ability to dive in with more depth. You can look at the entire kill chain and understand, not only if an alarm or identified incident is truly a true security issue versus a false positive, and it allows us to backtrack and figure out why it actually happened and how it got into the environment."
"The product allows us to focus on endpoint and antivirus protection."
"It is a very complete platform."
"The solution is very useful and easy to handle. You don't need much intervention with this product."
"We have another piece of that infrastructure that does what they call threat emulation. It's like sandboxing where it takes files that it doesn't know about, puts them in a VM-type environment, and it kicks them off to see if there's any malware or tendencies that might look like malware, that kind of thing."
 

Cons

"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"The product's scalability is an area of concern where improvements are required."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"If Trend Micro Endpoint Encryption comes up with a SaaS solution, it will be better rather than just having an on-premises solution."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"It would be great if this solution had support for file integrity monitoring."
"Support from them was not fast."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"The solution needs expanded endpoint query tools."
"There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."
"The product's stability could be improved."
"In the past, we've seen some stability issues in the latest version releases. We tend to hang back one version just to make sure issues are fully resolved to avoid user disruption."
"It could be a bit complicated. You have to be very familiar with Carbon Black to understand what it is doing and why it is doing. I would like to have more explanations and simplification in the user interface. It would be good to get help and see more explanations. It should tell us that a software is blocked and the reason for it. It would be good to be able to build chains in terms of what caused what, what worked, and what caused an issue. We are now moving from Carbon Black to Cortex XDR. While choosing antivirus software, we were also looking at Carbon Black because it also has an antivirus package, and it is next-generation, but we were told that Carbon Black doesn't support firewalls. We have Palo Alto firewalls. We would have chosen this solution if it supported firewalls, in particular next-generation firewalls, but unfortunately, it doesn't. Therefore, we decided on Cortex XDR because it integrates with Palo Alto firewalls."
"Adding an application and a device control feature would be a great help for this solution."
"Right now, Carbon Black CB Defense doesn't support cloud computing and Kubernetes."
"Its compatibility can be improved. It did crash a server during deployment, which is not something that I want to happen. Its deployment should also be easier. The whole deployment cycle needs to be simplified. It is an enterprise solution, and to set it up right now, you have to be an expert."
 

Pricing and Cost Advice

"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The solution's licensing costs are yearly."
"You have to pay for the license annually."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"The licensing cost is on the more expensive side, but I thought it was worth it because they did a good job. It was one of the vendors I truly didn't have to worry about too much until this latest upgrade."
"The pricing [is] more or less the same as other similar solutions."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"The product is quite reasonable."
"The pricing is annually based and operates through another department than mine."
"The pricing is very high."
"​The cost/benefit factor has great relevance in Cb Defense implementations​."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
883,011 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Performing Arts
16%
Manufacturing Company
10%
Marketing Services Firm
8%
Government
6%
Financial Services Firm
10%
Government
9%
Manufacturing Company
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: February 2026.
883,011 professionals have used our research since 2012.