Try our new research platform with insights from 80,000+ expert users

Trend Micro Endpoint Encryption vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
Endpoint Encryption (6th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Endpoint Protection Platform (EPP) (38th), Security Incident Response (7th), Endpoint Detection and Response (EDR) (36th), Ransomware Protection (8th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. Trend Micro Endpoint Encryption is designed for Endpoint Encryption and holds a mindshare of 3.5%, down 3.5% compared to last year.
VMware Carbon Black Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.8% mindshare, down 1.9% since last year.
Endpoint Encryption Market Share Distribution
ProductMarket Share (%)
Trend Micro Endpoint Encryption3.5%
Microsoft BitLocker21.6%
ESET Endpoint Encryption10.5%
Other64.4%
Endpoint Encryption
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
VMware Carbon Black Endpoint1.8%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.7%
Other83.7%
Endpoint Protection Platform (EPP)
 

Featured Reviews

VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's a secure and quick solution."
"The encryption is very good."
"The solution is good overall. All of its features are good."
"One valuable feature is full disk encryption."
"The most valuable feature is the support for email."
"Very good interface."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"Offers very good endpoint security solutions."
"This product has the capability of uploading scripts to the tool and this is a very comprehensive feature."
"The EDR and reports were helpful in improving our organization."
"The solution has a very nice API on the back end for remoting into a system and executing scripts or utilizing self automation."
"The visibility provided has been great."
"I like its reporting."
"We can access computers remotely if we need to."
"The product is pretty strong in terms of security and their features are very good in that respect."
"Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading."
 

Cons

"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"The product's scalability is an area of concern where improvements are required."
"Should have more features of Deep Scanning"
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"It is not easy to integrate with third party solutions."
"Trend Micro Endpoint Encryption currently lacks something similar to a firewall that can detect any vulnerabilities."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"Its compatibility can be improved. It did crash a server during deployment, which is not something that I want to happen. Its deployment should also be easier. The whole deployment cycle needs to be simplified. It is an enterprise solution, and to set it up right now, you have to be an expert."
"Integration is difficult, but CB Defense is more powerful than others. It is difficult to implement but easy to pick up many detections."
"The pricing could be more reasonable."
"The GUI and reporting should be addressed and the product's administration features need fine tuning."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"The solution needs better overall compatibility with other products."
"It is difficult to extract reports for ongoing scans"
"Carbon Black has limited capability to integrate with Rapid7."
 

Pricing and Cost Advice

"You have to pay for the license annually."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"The solution's licensing costs are yearly."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"Carbon Black might be a touch more expensive than Symantec. They tend to get a premium for their capabilities. They're sort of an industry leader in a lot of areas with the functionality that they provide."
"Carbon Black provides competitive pricing."
"VMware Carbon Black Endpoint is an expensive product."
"It's reasonable in price"
"The product is quite reasonable."
"The price for the solution is completely at government level, meaning one which is very high."
"In terms of licensing costs, Carbon Black CB Defense was all associated with CROW and the services my company is using with them, so it came all-inclusive."
"The product’s price is less expensive than other vendors."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
882,744 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Performing Arts
17%
Manufacturing Company
10%
Marketing Services Firm
8%
Government
6%
Financial Services Firm
10%
Government
9%
Manufacturing Company
8%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Microsoft, Sophos, Broadcom and others in Endpoint Encryption. Updated: February 2026.
882,744 professionals have used our research since 2012.