"The most valuable feature is that everything is done on the server."
"The initial setup is easy."
"The usability is the most valuable feature."
"This solution can be centrally managed."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"Overall, I think that it's very interesting."
"The most valuable feature is the support for email."
"Very good interface."
"We're very satisfied with Trend Micro support."
"I would like to see better compatibility with mobile devices."
"Integration with central management needs improvement."
"Sometimes the server console is very slow, so the performance could be improved."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"It would be great if this solution had support for file integrity monitoring."
"I would like to see more integration. Good cloud-based solutions need to be arrayed. I'd like to see better integration with administrative tools as well as Active Directory integration."
"We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software."
"Integration and support could be improved."
ESET Endpoint Encryption is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side requires no user interaction, increasing user compliance and the security of your company data.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 4 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 5 reviews. ESET Endpoint Encryption is rated 8.6, while Trend Micro Endpoint Encryption is rated 7.6. The top reviewer of ESET Endpoint Encryption writes "A stable solution with good support that assists us with GDPR compliance". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "A comprehensive addition to our security solution with good technical support". ESET Endpoint Encryption is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Sophos SafeGuard, Cisco Secure Endpoint and Check Point Full Disk Encryption Software Blade, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Symantec Endpoint Encryption, Sophos SafeGuard and WinMagic SecureDoc. See our ESET Endpoint Encryption vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.