We performed a comparison between ESET Endpoint Encryption and Trend Micro Endpoint Encryption based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."This solution can be centrally managed."
"The initial setup is easy."
"The most valuable feature is that everything is done on the server."
"The most valuable feature of ESET Endpoint Encryption is the high level of encryption protection."
"The most valuable feature of ESET Endpoint Encryption is its rate of capturing viruses and malware."
"The setup is getting easier."
"The product is easy to implement and configure."
"The Remote Administrator is the most valuable feature that ESET offers for us. Centralized management of our ESET environment is what I like about the Remote Administrator."
"Trend Micro provides good overall protection. It has saved us from a few attacks and malware."
"The product's initial setup phase is easy, considering the management console and software."
"Trend Micro Endpoint Encryption has good performance and is secure."
"Encryption is the basic feature, and that is what I like about it. I also like that it is kind of easy to install and easy to configure."
"The solution is good overall. All of its features are good."
"The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment."
"Overall, I think that it's very interesting."
"Fast encryption feature."
"Integration with central management needs improvement."
"ESET Endpoint Encryption needs to improve pricing and security."
"There could be an option for users to restart the system without a password."
"From an admin perspective, the solution's UI could be more user-friendly."
"If you have issues with your network, you can't get updates, which is a problem."
"There should be more frequent updates."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"I would like to see better compatibility with mobile devices."
"We had to use an integrator for the implementation of Trend Micro Endpoint Encryption. We have two people who work on this solution."
"The product's scalability is an area of concern where improvements are required."
"To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically."
"They need to come up with cloud solutions."
"Should have more features of Deep Scanning"
"In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support."
"I would like to improve the solution's support."
"Support from them was not fast."
More Trend Micro Endpoint Encryption Pricing and Cost Advice →
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 12 reviews while Trend Micro Endpoint Encryption is ranked 5th in Endpoint Encryption with 19 reviews. ESET Endpoint Encryption is rated 8.4, while Trend Micro Endpoint Encryption is rated 8.0. The top reviewer of ESET Endpoint Encryption writes "A reasonably priced solution that is an easy-to-use and effective at the same time". On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "Has fast encryption features". ESET Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, Symantec Endpoint Encryption and WinMagic SecureDoc, whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, VMware Carbon Black Endpoint, McAfee Complete Data Protection and Symantec Endpoint Encryption. See our ESET Endpoint Encryption vs. Trend Micro Endpoint Encryption report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.