Try our new research platform with insights from 80,000+ expert users
Senior Information Security Consultant at Future Telecom
Real User
Very good interface; integration and support could be improved
Pros and Cons
  • "Very good interface."
  • "Integration and support could be improved."

What is most valuable?

The interface is a great feature. 

What needs improvement?

Improvement of the solution could be made in relation to integration and support. For instance, quarantining endpoints which are reflected into a container, and not allowing the traffic to pass is something that you would expect from integration. It should inform the other devices on the network that there is a malicious endpoint, which has been quarantined. That EDR capability is not there.

For how long have I used the solution?

I've been using this solution for two years. 

What do I think about the stability of the solution?

It's a stable solution. 

Buyer's Guide
Trend Micro Endpoint Encryption
October 2024
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.

What do I think about the scalability of the solution?

This solution is not so scalable. We have a couple of guys who allow the endpoint security to run, they're admins. 

How are customer service and support?

We have not had any issues with Trend Micro but we've never raised any case with them. It's very rare that we would need support. 

Which solution did I use previously and why did I switch?

 We previously used Symantec as a solution but the product was quite old, and we had a lot of issues because it was slow. Many of the malwares, malicious programs used to run without Symantec informing or alerting that there was an issue.

How was the initial setup?

The initial setup is straightforward - it takes about eight minutes. 

What other advice do I have?

I would not recommend this solution. 

I would rate this product a six out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
LaithQuraam - PeerSpot reviewer
Operations and Sales Manager at Alpha Hub
Real User
Responsive support, secure, and good performance
Pros and Cons
  • "Trend Micro Endpoint Encryption has good performance and is secure."
  • "We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."

What is our primary use case?

Trend Micro Endpoint Encryption is used for our endpoints.

What is most valuable?

Trend Micro Endpoint Encryption has good performance and is secure.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year.

What do I think about the stability of the solution?

Trend Micro Endpoint Encryption is stable.

What do I think about the scalability of the solution?

The scalability of Trend Micro Endpoint Encryption has been good.

We have approximately 300 people using this solution and we plan on increasing usage.

How are customer service and support?

The support has been responsive and the level of support they provide is good.

How was the initial setup?

The initial setup of Trend Micro Endpoint Encryption is good.

What about the implementation team?

We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution.

What's my experience with pricing, setup cost, and licensing?

We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable.

What other advice do I have?

I would recommend this solution to others.

I rate Trend Micro Endpoint Encryption an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trend Micro Endpoint Encryption
October 2024
Learn what your peers think about Trend Micro Endpoint Encryption. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
All your files can be encrypted and stored in the cloud
Pros and Cons
  • "We're very satisfied with Trend Micro support."
  • "I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."

What is our primary use case?

There are basically two ways it can be deployed. It can be deployed in the cloud or it can be deployed in your endpoint. All your endpoints can be encrypted in the firewall and all your files can be encrypted and stored in the cloud if it is a cloud deployment. 

How has it helped my organization?

It passes your data as encrypted in all of your endpoints so that data is more secure so any threat of theft is minimized. 

What is most valuable?

I don't have much in the way of creative experience, but yes it was good.

What needs improvement?

I would like to see more integration. More feasible / secure cloud-based solutions need to arrive. I'd like to see better integration with administrative tools & Active Directory integration. 

For how long have I used the solution?

There are only one or two projects that I have done on Endpoint Encryption. The last time I was working with that was in 2020, so about a year.

How are customer service and technical support?

We're very satisfied with Trend Micro support.

What about the implementation team?

We work in coordination with Trend Micro itself, so we get advice from them and then implement that. Because it's a big company, they need their direct vendors, contacts, and solutions also.

What's my experience with pricing, setup cost, and licensing?

For the license cases, customers directly contact Trend Micro. 

What other advice do I have?

I would rate it eight out of 10.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user1283538 - PeerSpot reviewer
Presales Engineer at a tech services company with 11-50 employees
Real User
Offers good inspection and the detection of malware but needs better support
Pros and Cons
  • "Overall, I think that it's very interesting."
  • "In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."

What is most valuable?

Over the course of the time I have been using Trend Micro, I would say it is similar to Kaspersky. Overall, I think that it's very interesting, but I wasn't really impressed with the threat protection. For example the threat in the League of Legends for the Cloud.

What needs improvement?

In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support.

I would like to see next-gen anti-virus included in the next release.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year now.

What do I think about the stability of the solution?

For the inspection and the detection of malware, it is almost the same as Kaspersky or Symantec. We know they have a module for the use-pack for the malware, to defend from the pack, and I think it's good.

I have been infected with ransomware that they should catch, and if we get infected it must be learning for it to know it is malware. It's just a weakness. It's not so good for catching ransomware. It's someone in Indonesia. The problem is why we're always with the ransomware.

What other advice do I have?

On a scale of one to ten I would rate Trend Micro Endpoint Encryption a six.

In Indonesia, with our client/our partner, I am hands-on with this solution. Trend Micro, Kaspersky, Symantec, they're all the same. They're really the same technical approach and signature base. It's totally the same for me.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Buyer's Guide
Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2024
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free Trend Micro Endpoint Encryption Report and get advice and tips from experienced pros sharing their opinions.