Try our new research platform with insights from 80,000+ expert users
reviewer1221954 - PeerSpot reviewer
Network Administrator at a consultancy with 51-200 employees
Real User
Offers a full path and full description of any compromise to the system that shows you each and every step up to the cabinet-level
Pros and Cons
  • "Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
  • "To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."

What is our primary use case?

Currently, we are with Trend Micro as an antivirus solution and as our long-term plan to upgrade our solution to cover deep security services. So we plan to have it as not only the antivirus but as a complete endpoint security solution.

Trend Micro has a very good knowledge base. Even with the extensive history of issues available with Microsoft and all the other companies, you will find that the first group to discover and document the issues is Trend Micro. They have a big knowledge base and a big team working to offer this solution. There are a lot of companies available on the market providing similar solutions, but you cannot compare them with Trend Micro as far as depth and disclosure. 

What is most valuable?

The most important feature is that they give you the full path and full description of any compromise to the system. For example, if you have a compromised work station, Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level. The report includes not only the nodes, it goes to the very end of the attack so you can see exactly where it occurs and what changes it has made.

What needs improvement?

To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.

We are very happy with the product. I have seen a lot of products. They are almost similar, but I believe in the Trend Micro model. I don't know why, exactly, except that I have built some trust in the product because I'm dealing with different endpoint solutions for almost 15 years now. I never faced any issue with a virus in my environment using Endpoint. We are protected at all points, all clean, all the time. No attacks from the outside.

For how long have I used the solution?

We have been using this solution for almost two years now.

Buyer's Guide
Trend Micro Endpoint Encryption
February 2025
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
839,422 professionals have used our research since 2012.

What do I think about the stability of the solution?

There is no issue with the stability of this product. Even when we do a full survey of your server, you can see that if there has been an attack or any possibility of intrusion. It will detect the problem before it happens. 

There is one other very good option that checks for issues with a compromised update and it does this with any update. So let's say Microsoft, released an update, the problem will be located with deep security and it will automatically block whatever issue is there. It is like a pre-check or a precaution before the actual installation.

What do I think about the scalability of the solution?

We have between 150 to 200 users currently using the solution. We are very small because it is a private central office and we have branches. There are a lot of outside offices.

I do not think we are going to increase the usage of Endpoint Encryption right now because we are already covering all the users, even on their own machine. I don't think we have increased the number of users as we are covered and it is expensive to add more.

How are customer service and support?

The technical support for Trend Micro is fortunately only necessary for my central office. We have a dedicated contact with them. Quarterly, someone comes to check and make sure everything is working okay and that we are on the right track. The technical support from Trend Micro is perfect.

Which solution did I use previously and why did I switch?

Before we changed, we were looking for endpoint protection for the work station and the server. Specifically, we wanted a solution for what they call deep security and we found that in Apex One (advanced automated threat detection). So all these options are available, we'll see how they will fit with our environment and then have running to cover as at all times.

How was the initial setup?

The initial setup was straightforward. In the beginning, we started with our system environment and then we applied it to production. So once you enable the option, your machine is up and protected because all the setup and all of the configurations are out of the box. Maybe there was some customization applied here. It depends on the environment. But the main options function out of the box.

What about the implementation team?

We used a local guy for the deployment. Normally, we deal with the same local company. We prefer to have an engineer helping us out. It is not a matter of not trusting the Trend Micro installation, but we like to know that what we do is correct. We want to be sure that we use the best practices that come from Trend Micro.

What's my experience with pricing, setup cost, and licensing?

I do not handle the contracting part, but normally we go for a 3 to 5-year contract to get a better price over time.

Which other solutions did I evaluate?

Before Trend Micro Endpoint Encryption we did look at other solutions. I tried looking at Kaspersky and Norton. There really is no comparing them with Trend Micro. They are not serious competitors in my opinion. We made the choice because of technical capabilities. Once you are talking about security, you should be confident in your product and that it can cover your security needs.

What other advice do I have?

We do not use the cloud because we are not that happy with our experience trying to use it. You can call us old school but we are happy to have all our data on-premise.

The advice I would give to others looking into implementing Trend Micro Endpoint Encryption is that I totally recommend that anyone go with Trend Micro. Just go with them because they are very good.

On a scale from one to ten where ten is the best, I would rate this product a ten. I can say 11. I am very happy with the product.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
sheik abdul kader - PeerSpot reviewer
Unicorp Technologies LLC at Unicorp Technologies LLC
Reseller
Top 10
A secured and quick solution that needs more deep scan features
Pros and Cons
  • "It's a secure and quick solution."
  • "Should have more features of Deep Scanning"

What is our primary use case?

We have multiple clients, some clients use Sophos Endpoint Solution, and some even like to use Check Point Harmony. But comparatively, Trend Micro Endpoint Encryption is much better than these other solutions. 

This solution is being used by us for the baking sector, but mainly we are dealing with government entities, as well as the military environment.  

What is most valuable?

It's a secured solution and, unlike other solutions, Trend Micro Endpoint Encryption does not choke the system during the scanning process. If you take Sophos or Check Point Harmony, it dumps the system for a while. When a large file is given, other tools will take time to open during the back-end scanning process of the file. The update will be done in one or two hours, during this time the system and the server will run very slow. Trend Micro Endpoint Encryption does not take that much time and the CPU's play session for that process. 

What needs improvement?

With the data and architecture, this tool uses different technology, but there should be more features of Deep Scanning. Different scenarios, related to desktop applications where the text files are sitting in the drive, should be even in the system's ready-to folder. So that it becomes an executable file and Deep Scan should be available now. 

For how long have I used the solution?

We use IP 360 and Tick and in some cases, there are end-point solutions as well. 
I have been using this solution for a year. 

What do I think about the stability of the solution?

I would rate the stability a nine out of ten. 

What do I think about the scalability of the solution?

Our clients for Trend Micro Endpoint Encryption are enterprises. I would rate the scalability a seven out of ten. 

How are customer service and support?

Support is very good, we are really satisfied. They even provide support for the partners very closely. I would rate nine out of ten for customer support. 

How would you rate customer service and support?

Positive

How was the initial setup?

I would rate the initial setup a nine out of ten. Our clients use the tool on-cloud and on-premises. Deployment of this solution does not take much time. Hardware-wise, for on-prem devices, where we are installing IP or Activewire sort of things, it takes one day time. For endpoint client installation, when I am pushing the files from the server itself, it will take hardly an hour to finish setting up all the systems. 

What other advice do I have?

I would definitely recommend this solution, mainly because of the customer-specific view, the end user who's using the system, wants to use the system without any delay. I would overall rate the solution an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Trend Micro Endpoint Encryption
February 2025
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
839,422 professionals have used our research since 2012.
Service delivery senior manager at Advika
Real User
Top 5Leaderboard
A stable solution that helps with data encryption
Pros and Cons
  • "We use the solution for data encryption."
  • "I would like to improve the solution's support."

What is our primary use case?

We use the solution for data encryption. 

What needs improvement?

I would like to improve the solution's support. 

For how long have I used the solution?

I have been working with the product for three years. 

What do I think about the stability of the solution?

I would rate the product's stability a seven point five out of ten.

What do I think about the scalability of the solution?

I would rate the product's scalability a seven point five out of ten. My company has one to two users for the product. 

How are customer service and support?

The solution's tech support is slow and takes around two days to collect information. They respond only through email. 

How was the initial setup?

The product's setup is neither straightforward nor complicated. 

What's my experience with pricing, setup cost, and licensing?

The solution's licensing costs are yearly. 

What other advice do I have?

I would rate the product an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN
Real User
Top 5
Good more MSPs but the security features can use improvement

What is our primary use case?

We use the solution for security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.

What is most valuable?

Trend Micro Endpoint Encryption is stable and easy to use. It's very useful for an MSP company, making it easy and efficient to work.

What needs improvement?

Security features could be improved.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

The solution is scalable because it doesn't require an on-premise server installed. Everything is being monitored and managed from the cloud portal, irrespective of the number of agents. You can manage all from one portal.

How are customer service and support?

Vendors are locally present in our country. We contact them via email, etc. We are very flexible with vendor support.

How was the initial setup?

The initial setup is straightforward. One person is enough for it.

An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.

What about the implementation team?

Deployment can be done by yourself.

What's my experience with pricing, setup cost, and licensing?

The MSP's model or licensing is global and has very reasonable prices. Also, the perpetual license model is reasonable. It's cheap for the assembly companies. Licensing is very straightforward.

What other advice do I have?

More than five to ten technical persons are using the support. We will be able to sell those agents to more than 20 companies.

Only one technical guy is enough for a large company for the installation and the management. Many logs, alarms, and entries are happening in the portal regarding management.

Trend Micro can be a viable option for SMBs looking for a basic EDR or PRT solution. However, for larger organizations or those with highly complex security needs demanding advanced services and sophisticated department knowledge, Trend Micro's capabilities might not be sufficient.

Overall, I rate the solution a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Durai  Singh - PeerSpot reviewer
Business Owner at Ararat Technologies
Reseller
Top 5
An Endpoint Encryption solution that encrypts data on a wide range of devices
Pros and Cons
  • "The solution is good overall. All of its features are good."
  • "It is not easy to integrate with third party solutions."

What is most valuable?

The solution is good overall. All of its features are good. 

What needs improvement?

It is not easy to integrate with third-party solutions. 

For how long have I used the solution?

I have been using the solution for six to seven years. 

What do I think about the stability of the solution?

There are some issues with the product stability. I rate the stability a six out of ten. 

What do I think about the scalability of the solution?

The scalability of the product is good. 

How was the initial setup?

The initial setup is straightforward. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
reviewer2027445 - PeerSpot reviewer
Cyber Security Engineer at a security firm with 11-50 employees
Real User
Reliable with good encryption but needs a better interface
Pros and Cons
  • "The disk encryption is great."
  • "Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."

What is our primary use case?

We primarily use the solution for endpoint encryption. It's used on devices such as desktops and laptops. 

How has it helped my organization?

The encryption part basically is a fundamental part of encrypting our disks so as to avoid any data spill or breach. The productivity is the same as all encryption vendors. Even the technique of encryptions is all the same if compared to McAfee or other drive encryptions. However, having something on offer that can lock our drives is great. 

The hassle comes in whenever you need to decrypt back your assets before leaving the company. 

What is most valuable?

Encryption-wise it is good. The disk encryption is great. 

It's pretty comparable to other products. 

The initial setup is mostly straightforward. 

It's scalable. 

The product is largely stable. 

What needs improvement?

It's not a full, complete set. Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust.

The interface could be better. It would be better if we could control how we actually view that status.

The product visibility could improve. Managing the endpoints could be better. 

For how long have I used the solution?

I've worked with the solution for about a year or more. 

What do I think about the stability of the solution?

The stability is okay It's stable enough. There are no bugs or glitches. It doesn't crash or freeze. 

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

I haven't escalated anything to support just yet. 

Which solution did I use previously and why did I switch?

I'm also using Bitlocker and McAfee Disk Encryption.

How was the initial setup?

Although the setup is largely straightforward, there can be some complexity. It's a moderate setup process. 

The deployment typically takes 15 to 20 minutes. It's pretty quick. 

The solution is not difficult to maintain. 

What's my experience with pricing, setup cost, and licensing?

I don't handle any aspects of the pricing or licensing. I'm more on the technical side. 

What other advice do I have?

I'm an end-user. I do integrations with other endpoint protection solutions as well. 

I'm dealing with the latest version.

The product is good. That said, if you focus on only endpoint encryption, then Trend Micro doesn't give you the full scope. There are other vendors outside that only focus on encryption. It's a good product for startups or for starting to learn about encryption. I don't really see this as a complete full endpoint encryption solution.

I'd rate the solution six out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Senior Information Security Consultant at Future Telecom
Real User
Very good interface; integration and support could be improved
Pros and Cons
  • "Very good interface."
  • "Integration and support could be improved."

What is most valuable?

The interface is a great feature. 

What needs improvement?

Improvement of the solution could be made in relation to integration and support. For instance, quarantining endpoints which are reflected into a container, and not allowing the traffic to pass is something that you would expect from integration. It should inform the other devices on the network that there is a malicious endpoint, which has been quarantined. That EDR capability is not there.

For how long have I used the solution?

I've been using this solution for two years. 

What do I think about the stability of the solution?

It's a stable solution. 

What do I think about the scalability of the solution?

This solution is not so scalable. We have a couple of guys who allow the endpoint security to run, they're admins. 

How are customer service and technical support?

We have not had any issues with Trend Micro but we've never raised any case with them. It's very rare that we would need support. 

Which solution did I use previously and why did I switch?

 We previously used Symantec as a solution but the product was quite old, and we had a lot of issues because it was slow. Many of the malwares, malicious programs used to run without Symantec informing or alerting that there was an issue.

How was the initial setup?

The initial setup is straightforward - it takes about eight minutes. 

What other advice do I have?

I would not recommend this solution. 

I would rate this product a six out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Associate at IntimeSolutions
Real User
Top 5
Good protection and encryption capabilities but needs cloud capabilities
Pros and Cons
  • "The encryption is very good."
  • "They need to come up with cloud solutions."

What is our primary use case?

We primarily use the solution for encryption. If there is sensitive organizational data, they use encryption to protect it from threats. This way, people can't misuse the data. 

How has it helped my organization?

If we have a user, for example, that loses a laptop, the data will be protected as it will be encrypted. It does a good job of protecting an organization's data. 

What is most valuable?

The encryption is very good. 

The native encryption is great. There are a few different types of encryption on offer which allows for various levels of protection. It even protects passwords. It does good authentication as well. 

It is stable. 

Support is helpful.

The product can scale. 

What needs improvement?

They need to come up with cloud solutions. 

For how long have I used the solution?

We've been using the solution for a few years. We have customers that use it. 

What do I think about the stability of the solution?

The stability is good overall. It's a stable solution. The product is very strong and offers very reliable encryption. No one would be able to access the data unless they were allowed to. There are no bugs or glitches. 

What do I think about the scalability of the solution?

The scalability is good. You can extend your license at any time as necessary.

We have eight customers using the solution right now. 

How are customer service and support?

We do get an okay response from technical support. They are helpful. 

Which solution did I use previously and why did I switch?

We're currently looking for solutions that can help us deal with encryption issues. 

I have experience using Microsoft as well. 

How was the initial setup?

The setup process is pretty good. It's not overly complex. 

The deployment took about ten minutes or so. It's pretty fast. We can configure the solution using scripts. 

What's my experience with pricing, setup cost, and licensing?

The licensing is paid yearly. 

The cost is not overly expensive compared to other competitors. For example, it is cheaper than Microsoft. 

What other advice do I have?

It's a decent solution. It's a commandless solution that can help protect organizations from data loss. I'd recommend any company adopt some sort of encryption in order to protect their data from threats and users.

I'd rate the solution seven out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: February 2025
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.