Check Point Full Disk Encryption Software Blade vs Trend Micro Endpoint Encryption comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Check Point Full Disk Encryption Software Blade and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.

Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
767,847 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It is a cross-platform tool.""We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives.""Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers.""It helps us maximize the operational efficiency and performance of our activities.""This encryption is relatively fast and really covers the needs required.""They have Disc Encryption, Anti-Malware, and a VPN Blade which is beneficial for us.""The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection.""The solution provides complete security for one's workstation."

More Check Point Full Disk Encryption Software Blade Pros →

"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure.""Trend Micro Endpoint Encryption has good performance and is secure.""The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment.""The product's initial setup phase is easy, considering the management console and software.""We use the solution for data encryption.""The most valuable feature of Trend Micro Endpoint Encryption is security.""The encryption is very good.""The most valuable feature is the support for email."

More Trend Micro Endpoint Encryption Pros →

Cons
"The price is high for small scale business enterprises.""Sometimes the performance rates are not consistent.""In the future, I would like to see is the ability to decrypt equipment.""The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time.""I would like to bring centralized management to mobile devices.""They could improve the latency in the platform when entering the portal.""You do need to be careful that you don't mess too much with the endpoint, or you might have issues with the work stations.""There are a few cases of security breaches when the networking system fails and can lead to malware attacks. The next release should focus more on data virtualization and support for all computing devices."

More Check Point Full Disk Encryption Software Blade Cons →

"Should have more features of Deep Scanning""In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful.""We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution.""I would like to improve the solution's support.""I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration.""Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust.""To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically.""Support from them was not fast."

More Trend Micro Endpoint Encryption Cons →

Pricing and Cost Advice
  • "As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
  • More Check Point Full Disk Encryption Software Blade Pricing and Cost Advice →

  • "One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
  • "You have to pay for the license annually."
  • "We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
  • "The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
  • "The solution's licensing costs are yearly."
  • "I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
  • "I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
  • More Trend Micro Endpoint Encryption Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    767,847 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The cost of licenses depends on the characteristics or implementation you are looking for.
    Top Answer:They should improve the interface and make it a little more user-friendly. They should also improve performance in encrypting and decrypting data more efficiently. A lot of machine resources are… more »
    Top Answer:The product's initial setup phase is easy, considering the management console and software.
    Top Answer:The licensing part of the product is managed by the IT infra team in my company. You need to make payments towards the user-based license. In a company with around 100 users, there is a need to pay… more »
    Top Answer:I cannot make any modifications or changes in the application currently. The product's scalability is an area of concern where improvements are required.
    Ranking
    4th
    out of 28 in Endpoint Encryption
    Views
    630
    Comparisons
    312
    Reviews
    12
    Average Words per Review
    474
    Rating
    8.5
    5th
    out of 28 in Endpoint Encryption
    Views
    2,175
    Comparisons
    1,071
    Reviews
    10
    Average Words per Review
    382
    Rating
    8.0
    Comparisons
    Learn More
    Overview

    The Check Point Full Disk Encryption Software Blade provides automatic security for all information on endpoint hard drives, including user data, operating system files and temporary and erased files. For maximum data protection, multi-factor pre-boot authentication ensures user identity, while encryption prevents data loss from theft.
    Learn more about Full disk encryption.

    Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.

    Sample Customers
    Osmose, International Fund for Animal Welfare (IFAW)
    Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
    Top Industries
    REVIEWERS
    Security Firm29%
    Government14%
    Financial Services Firm14%
    Cloud Provider14%
    VISITORS READING REVIEWS
    Security Firm24%
    Computer Software Company22%
    Financial Services Firm15%
    Insurance Company4%
    REVIEWERS
    Financial Services Firm22%
    Outsourcing Company11%
    Comms Service Provider11%
    Educational Organization11%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Government13%
    Financial Services Firm8%
    Real Estate/Law Firm7%
    Company Size
    REVIEWERS
    Small Business57%
    Midsize Enterprise9%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise11%
    Large Enterprise51%
    REVIEWERS
    Small Business67%
    Midsize Enterprise19%
    Large Enterprise14%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise20%
    Large Enterprise58%
    Buyer's Guide
    Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption
    March 2024
    Find out what your peers are saying about Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption and other solutions. Updated: March 2024.
    767,847 professionals have used our research since 2012.

    Check Point Full Disk Encryption Software Blade is ranked 4th in Endpoint Encryption with 16 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 19 reviews. Check Point Full Disk Encryption Software Blade is rated 8.6, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Check Point Full Disk Encryption Software Blade writes "Centralized management with full disk encryption and helpful authentification capabilities". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". Check Point Full Disk Encryption Software Blade is most compared with Microsoft BitLocker, Cisco Secure Endpoint and McAfee Complete Data Protection, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, McAfee Complete Data Protection and Symantec Endpoint Encryption. See our Check Point Full Disk Encryption Software Blade vs. Trend Micro Endpoint Encryption report.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.