No more typing reviews! Try our Samantha, our new voice AI agent.

Check Point Full Disk Encryption Software Blade vs Trend Micro Endpoint Encryption [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Check Point Full Disk Encry...
Average Rating
8.8
Reviews Sentiment
7.6
Number of Reviews
16
Ranking in other categories
Endpoint Encryption (6th), Mobile Data Protection (3rd)
Trend Micro Endpoint Encryp...
Average Rating
8.0
Reviews Sentiment
6.3
Number of Reviews
22
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Danit Sannikov - PeerSpot reviewer
Project manager at SII
Can be well-integrated with the existing systems in a company and is very intuitive to use
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the username and password but also through SMS in an easy manner is something that needs to be added to the tool. When I changed the way I connect to the tool to the SMS option, I did it because I bought a new phone, and it had a problem connecting with the tool, after which I had to go to the settings to change it, so I felt it was not very intuitive. In other platforms, the user will have two options to connect, one of which is with a username and password, and the other one is with an SMS.
VL
Senior Technical Solutions Architect at CMS Computers India Pvt Ltd.
Centralized encryption management has strengthened compliance and protects sensitive data daily
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working. There could be improvements specifically about the scanning part and policy part where we have to deploy what we actually require. I would like to see features that include collaboration of all alerts and applied analytics so we can immediately identify issues. Analytics can provide immediate reporting before issues spread, as sometimes one issue captured at the site level can spread to high-level operations. If identified and communicated to the team immediately, it could prevent issues. Usually, downloading and reviewing the report takes too much time, and many engineers skip it due to the volume of tasks. However, analytics could generate alerts and ticketing if integrated with the EMS application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It has addressed storage and data transfer demands efficiently."
"We never had any complaints about the performance of computers with this tool to be able to manage the protection of disks and drives."
"We haven't had anything related to threats pass through our system in the last five years."
"It is a cross-platform tool."
"The most valuable feature of Check Point Full Disk Encryption Software Blade is hard disk protection."
"The initial setup is easy."
"Its ability to provide a security layer of encryption that allows us to prevent unauthorized access to computers."
"It helps us maximize the operational efficiency and performance of our activities."
"Trend Micro Endpoint Encryption has good performance and is secure."
"We are protected at all points, all clean, all the time, with no attacks from the outside."
"Trend Micro Endpoint Encryption has good performance and is secure."
"The interface is a great feature."
"We use encryption to secure data and devices, and in case you lose your device or your data, this is a major feature that covers everything through encryption."
"Logging and reporting capabilities of Trend Micro Endpoint Encryption help with compliance verification, and there are no issues."
"One valuable feature is full disk encryption."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
 

Cons

"The solution is overpriced."
"The response time for technical support could be faster."
"The price is high for small scale business enterprises."
"The encryption is fast; however, when it comes to generating decryption of the OS disks, it is sometimes very slow, generating a loss of time."
"Sometimes the performance rates are not consistent."
"In the future, I would like to see is the ability to decrypt equipment."
"They could improve the latency in the platform when entering the portal."
"I rate the support from Check Point Full Disk Encryption Software Blade a six out of ten."
"In the next release, it would be better if it was more user-friendly."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"Should have more features of Deep Scanning"
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not working."
"There are a couple of bugs in this solution and these are creating a very large transaction log in the database, sometimes reaching 300GB, which is very annoying."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly."
 

Pricing and Cost Advice

"As it costs $125 per workstation per year, something which is above the price of what the competition is charging, the solution is definitely too expensive."
"I rate the product price a seven on a scale of one to ten, where one is cheap, and ten is expensive."
"You have to pay for the license annually."
"The solution's licensing costs are yearly."
"The drive encryption of Trend Micro Endpoint Encryption could improve. Some of my customers have some problems."
"I rate the product price a six on a scale of one to ten, where one is high price, and ten is low price."
"One of the reasons we decided to go with Trend Micro Endpoint Security is because of its cost effectiveness."
"We pay for Trend Micro Endpoint Encryption every six months. The price of the solution is reasonable."
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
893,164 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Performing Arts
14%
Manufacturing Company
12%
Marketing Services Firm
7%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise3
Large Enterprise9
By reviewers
Company SizeCount
Small Business14
Midsize Enterprise4
Large Enterprise5
 

Questions from the Community

What needs improvement with Check Point Full Disk Encryption Software Blade?
I once faced a problem with the tool, but I remember that I managed to work without a VPN, and then the problem with the product was sorted out somehow. An option to connect not only with the usern...
What is your primary use case for Check Point Full Disk Encryption Software Blade?
I use the solution when working outside my office. The tool is for VPNs, so I can connect to the Office Cloud.
What advice do you have for others considering Check Point Full Disk Encryption Software Blade?
The product does not involve data protection since it is used for connection purposes only. The product might have something for data protection that I might not know about since I am not a profess...
What needs improvement with Trend Micro Endpoint Encryption?
When deploying Trend Micro Endpoint Encryption, we faced some issues where scanning was not happening properly, and the policies may not have been created properly, which is the reason it was not w...
 

Overview

 

Sample Customers

Osmose, International Fund for Animal Welfare (IFAW)
Alertboot, Beth Israel Deaconess Care Organization (BIDCO), Bulgarian American Credit Bank, Independent Investigations Office of BC (IIOBC), Rush University Medical Center, United Way of Greater Atlanta
Find out what your peers are saying about Microsoft, Sophos, ESET and others in Endpoint Encryption. Updated: April 2026.
893,164 professionals have used our research since 2012.