What is our primary use case?
Trend Micro Endpoint Encryption is typically used for hardware-focused scenarios, particularly laptop disk encryption, since people travel frequently outside of offices, which makes laptops susceptible to theft.
The disk encryption component is utilized extensively, and email DLP is used to block emails containing specific keywords.
Email DLP is the primary requirement because certain data must not be transmitted externally.
The encryption over the disk has improved, and if any encrypted USB is removed, data cannot be copied.
Logging cases have also been documented where printing is prevented.
What is most valuable?
I use the centralized management feature because we majorly use DCDR and near DR sites.
The single console helps me manage all sites, take reports, and push policies.
Multiple authentication methods are used, and they have impacted our organization's access controls.
Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues. We have also conducted VAPT for the URL, which is satisfactory, as we are not finding any abnormality in it.
It is financially beneficial to use Trend Micro Endpoint Encryption. All applications in the DLP and antivirus category provide similar results, but what matters is how the company approaches and supports the customer, as well as the cost factor. If you maintain costs and provide good customer service, the ratio of customer satisfaction can be increased.
What needs improvement?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working.
There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require.
I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues.
Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations.
If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks.
However, analytics could generate alerts and ticketing if integrated with the EMS application.
For how long have I used the solution?
I have been working with Trend Micro Endpoint Encryption for almost six to eight years, as I used it in my previous organization, and currently, I am using Symantec.
When you called me previously, I was working with another entity, and now I am working with a different entity.
What do I think about the scalability of the solution?
Deployment of this product requires a maximum of one month.
It totally depends on the size of the scope and how much work you are doing.
As I have worked on bigger-sized projects, it takes a maximum of one month because it is a repetitive job.
If we create one scope of work document, then that same SOW is shared with all the team, and then the time can be defined.
How are customer service and support?
My experience with technical support is good, as I have not encountered any concerns regarding a lack of support or being stuck somewhere.
Based on my experience, I would rate support between eight to nine, as it is not very high due to timeline-related issues sometimes.
The time at which I log a case affects how support is enabled, but it is generally between nine to ten.
How would you rate customer service and support?
What about the implementation team?
Approximately five to six people are usually involved in the process of deployment from my side.
These people are engineers.
Which other solutions did I evaluate?
Trend Micro Endpoint Encryption is appealing for me and my customers because nowadays, everyone is introducing artificial intelligence.
My experience over the last year is that Trend Micro is not focusing a lot on maintaining the customer list, as many customers have moved to Trellix and other entities providing similar products.
I mostly work with Trend Micro now but also discuss Kaspersky and other vendors.
Trellix is also becoming more prevalent in the market.
What other advice do I have?
We faced some challenges related to the DLP part, but we sorted them out.
It depends on a case-by-case basis, but the majority of issues we closed.
I have not utilized the real-time encryption feature with Trend Micro Endpoint Encryption since it is not required by my company because our majority task is offline.
We work on bids and submitting tenders, so immediate encryption is not yet required for us.
I assess that the ease of setting up encryption policies using Trend Micro Endpoint Encryption is good, as that is now a part of compliance for all government audits.
I would rate this review an eight overall.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.