We performed a comparison between Dell Encryption Enterprise [EOL] and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, McAfee, Check Point Software Technologies and others in Endpoint Encryption."We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server."
"The technical support provided by Dell EMC comes with proactive technical support."
"One place where I can give them top level is the tiered administration, whereby you can assign roles to the support team to say, "You would be responsible for changing passwords. You would be responsible for system management and configurations, and you are the major admin of this." They have that on lockdown. The active directory integration is also pretty okay. It is not so bad. It does have normal features that most of the encryption tools have, such as full-disk encryption, volume encryption, and external drive encryption. I am not sure if they do file-level encryption and if DLP is integrated with the encryption product. I would like to assume that these features are there."
"The product's initial setup phase is easy, considering the management console and software."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
"It's a secure and quick solution."
"The most valuable feature is the support for email."
"We use the solution for data encryption."
"Overall, I think that it's very interesting."
"We're very satisfied with Trend Micro support."
"Endpoint can give you the full details about how the attacker moved into and through your system. That description shows you each and every step up to the cabinet-level."
"As soon as we introduce any new tools or applications, we have to work with the back-end team to handle new problems that are created. Once they're figured out, the solution will stabilize, but the problems keep coming up whenever we introduce a new tool or application. It has been a challenge."
"Some customers have less security in the solution regarding their data."
"It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user."
"Compared to Bitlocker or McAfee Disk Encryption, it's not quite as robust."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful."
"I would like to improve the solution's support."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"It would be great if this solution had support for file integrity monitoring."
"Should have more features of Deep Scanning"
More Trend Micro Endpoint Encryption Pricing and Cost Advice →
Dell Encryption Enterprise [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Encryption with 3 reviews while Trend Micro Endpoint Encryption is ranked 4th in Endpoint Encryption with 19 reviews. Dell Encryption Enterprise [EOL] is rated 7.4, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of Dell Encryption Enterprise [EOL] writes "Helpful auto-decryption features and great tech support, but problems with adding new applications and a time-consuming decryption process". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". Dell Encryption Enterprise [EOL] is most compared with , whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, Symantec Endpoint Encryption and McAfee Complete Data Protection.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.