We performed a comparison between Dell Encryption Enterprise [EOL] and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption."The technical support provided by Dell EMC comes with proactive technical support."
"We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server."
"One place where I can give them top level is the tiered administration, whereby you can assign roles to the support team to say, "You would be responsible for changing passwords. You would be responsible for system management and configurations, and you are the major admin of this." They have that on lockdown. The active directory integration is also pretty okay. It is not so bad. It does have normal features that most of the encryption tools have, such as full-disk encryption, volume encryption, and external drive encryption. I am not sure if they do file-level encryption and if DLP is integrated with the encryption product. I would like to assume that these features are there."
"The most valuable feature of Trend Micro Endpoint Encryption is security."
"Offers very good endpoint security solutions."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"The product's initial setup phase is easy, considering the management console and software."
"The disk encryption is great."
"It's a secure and quick solution."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"The encryption is very good."
"Some customers have less security in the solution regarding their data."
"It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user."
"As soon as we introduce any new tools or applications, we have to work with the back-end team to handle new problems that are created. Once they're figured out, the solution will stabilize, but the problems keep coming up whenever we introduce a new tool or application. It has been a challenge."
"It is not easy to integrate with third party solutions."
"The user interface is a little challenging, especially for beginners. It's hard for new users to understand how to configure the correct access for each company function."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"Integration and support could be improved."
"I would like to improve the solution's support."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
More Trend Micro Endpoint Encryption Pricing and Cost Advice →
Dell Encryption Enterprise [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Encryption with 3 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 20 reviews. Dell Encryption Enterprise [EOL] is rated 7.4, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Dell Encryption Enterprise [EOL] writes "Helpful auto-decryption features and great tech support, but problems with adding new applications and a time-consuming decryption process". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". Dell Encryption Enterprise [EOL] is most compared with , whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, McAfee Complete Data Protection and Symantec Endpoint Encryption.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.