Try our new research platform with insights from 80,000+ expert users

Share your experience using Fabasoft eGov

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 102,000+ reviews on PeerSpot:

Senior Technical Solutions Architect at a computer software company with 1,001-5,000 employees
Real User
Top 20
Jan 21, 2026
Centralized encryption management has strengthened compliance and protects sensitive data daily
Pros and Cons
  • "Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues."
  • "When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working."

What is our primary use case?

Trend Micro Endpoint Encryption is typically used for hardware-focused scenarios, particularly laptop disk encryption, since people travel frequently outside of offices, which makes laptops susceptible to theft.

The disk encryption component is utilized extensively, and email DLP is used to block emails containing specific keywords.

Email DLP is the primary requirement because certain data must not be transmitted externally.

The encryption over the disk has improved, and if any encrypted USB is removed, data cannot be copied.

Logging cases have also been documented where printing is prevented.

What is most valuable?

I use the centralized management feature because we majorly use DCDR and near DR sites.

The single console helps me manage all sites, take reports, and push policies.

Multiple authentication methods are used, and they have impacted our organization's access controls.

Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues. We have also conducted VAPT for the URL, which is satisfactory, as we are not finding any abnormality in it.

It is financially beneficial to use Trend Micro Endpoint Encryption. All applications in the DLP and antivirus category provide similar results, but what matters is how the company approaches and supports the customer, as well as the cost factor. If you maintain costs and provide good customer service, the ratio of customer satisfaction can be increased.

What needs improvement?

When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working.

There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require.

I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues.

Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations.

If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks.

However, analytics could generate alerts and ticketing if integrated with the EMS application.

For how long have I used the solution?

I have been working with Trend Micro Endpoint Encryption for almost six to eight years, as I used it in my previous organization, and currently, I am using Symantec.

When you called me previously, I was working with another entity, and now I am working with a different entity.

What do I think about the scalability of the solution?

Deployment of this product requires a maximum of one month.

It totally depends on the size of the scope and how much work you are doing.

As I have worked on bigger-sized projects, it takes a maximum of one month because it is a repetitive job.

If we create one scope of work document, then that same SOW is shared with all the team, and then the time can be defined.

How are customer service and support?

My experience with technical support is good, as I have not encountered any concerns regarding a lack of support or being stuck somewhere.

Based on my experience, I would rate support between eight to nine, as it is not very high due to timeline-related issues sometimes.

The time at which I log a case affects how support is enabled, but it is generally between nine to ten.

How would you rate customer service and support?

Positive

What about the implementation team?

Approximately five to six people are usually involved in the process of deployment from my side.

These people are engineers.

Which other solutions did I evaluate?

Trend Micro Endpoint Encryption is appealing for me and my customers because nowadays, everyone is introducing artificial intelligence.

My experience over the last year is that Trend Micro is not focusing a lot on maintaining the customer list, as many customers have moved to Trellix and other entities providing similar products.

I mostly work with Trend Micro now but also discuss Kaspersky and other vendors.

Trellix is also becoming more prevalent in the market.

What other advice do I have?

We faced some challenges related to the DLP part, but we sorted them out.

It depends on a case-by-case basis, but the majority of issues we closed.

I have not utilized the real-time encryption feature with Trend Micro Endpoint Encryption since it is not required by my company because our majority task is offline.

We work on bids and submitting tenders, so immediate encryption is not yet required for us.

I assess that the ease of setting up encryption policies using Trend Micro Endpoint Encryption is good, as that is now a part of compliance for all government audits.

I would rate this review an eight overall.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jan 21, 2026
Flag as inappropriate
reviewer2083461 - PeerSpot reviewer
Information Security Analyst at a real estate/law firm with 5,001-10,000 employees
Real User
Top 20
Jan 5, 2026
Secures data loss for our law firm but has struggled with outdated, complex management
Pros and Cons
  • "McAfee Complete Data Protection has its own encryption version, and it works independently."
  • "On a technical level, when I draw a comparison between McAfee Complete Data Protection and CrowdStrike, McAfee Complete Data Protection is a one out of ten, and then CrowdStrike is a ten out of ten."

What is our primary use case?

My major use case for McAfee Complete Data Protection is for DLP. McAfee Complete Data Protection helps to prevent data exfiltration, and I only use the tool for DLP. I don't use it for AV or any sort of threat prevention. I'm not using McAfee Complete Data Protection for role-based access.

What is most valuable?

If I had to say one or two things about McAfee Complete Data Protection that I think is the best for me or makes the most positive impact, it would be that McAfee Complete Data Protection is the cheapest solution in comparison to some of the other tools out there.

The tool itself comes in at a certain price point. I was looking at Microsoft for a DLP solution because they also do it, but at the time, they just didn't have that feature parity. McAfee Complete Data Protection has its own encryption version, and it works independently. It works on Apple Macs and it works on PCs, so it's more beneficial for us.

What needs improvement?

On a technical level, when I draw a comparison between McAfee Complete Data Protection and CrowdStrike, McAfee Complete Data Protection is a one out of ten, and then CrowdStrike is a ten out of ten.

I say that technically McAfee Complete Data Protection is so low because the console and the portal haven't changed in almost ten years. It's had some slight visual improvements, but that's it. It's not really working in a modern portal the way that some of the enterprise apps like CrowdStrike actually work.

McAfee Complete Data Protection is also very difficult to use. It takes a lot of time to get my head around how it actually operates. It's not very intuitive. However, in terms of pricing and the specific use cases that I have, it's good.

For how long have I used the solution?

I've been dealing with McAfee Complete Data Protection for over ten years.

How are customer service and support?

I have dealt with technical support from McAfee Complete Data Protection. It just depends on where I get the person. If the person is based out of the USA, they're usually very technical and very responsive. If I get a technical resource from any other part of the world, they're terrible.

Technical support in general from McAfee, I'd probably give them a six.

I've spoken to support engineers out of the USA, and they're excellent. They know what they're talking about. They're passionate about the product. Everyone else is sort of asking to 'provide logs' or 'explain the issue more'. It's just too hard.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of McAfee Complete Data Protection itself is difficult. There's a three-hundred-page user guide. It's not an easy approach.

Which other solutions did I evaluate?

I'm comparing it to CrowdStrike.

What other advice do I have?

I'm already covered in terms of my IT needs, but I do at the moment already want to speak to you in respect to that.

In terms of Microsoft BitLocker, that's part of licensing already, so I'm not sure what that's about specifically. In terms of McAfee Complete Data Protection, I've got part of the McAfee suite on an enterprise level.

I'm a law firm, and I use McAfee Complete Data Protection as a customer. I purchased McAfee Complete Data Protection directly from McAfee via one of their authorized resellers.

McAfee Complete Data Protection itself is good. I haven't logged any support tickets in the last twelve months.

The biggest problem is with McAfee Complete Data Protection, and why I haven't raised any support tickets, is because I haven't touched it.

I haven't upgraded any of the available updates on the endpoint for McAfee Complete Data Protection. I haven't updated the ePO console on the new server. It's just been stagnant. So I'm assuming that when I do the upgrade across the endpoints and also on the ePO server, it is going to impact usability and I'm going to have some support issues. That's where we are at the moment.

On a scale from zero to ten, I give McAfee Complete Data Protection a rating of six.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jan 5, 2026
Flag as inappropriate