Earn 20 points
Stormshield Data Security is based on end-to-end data encryption, from user to recipient, so as to provide transparent protection against man-in-the-middle attacks, malicious administration, and data leaks.
Trend Micro Endpoint Encryption, a full disk, file encryption and data protection that ensures data privacy by encrypting data stored on your endpoints - including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro Endpoint Encryption provides the data security with full disk encryption, folder and file encryption, and removable media encryption. It protects data at rest with full disk encryption software, automates data management with self-encrypting hard drives, encrypt data in specific files, shared folders, removable media and set granular policies for device control and data management. A single, well-integrated management console allows to manage the users using the same interface for endpoint protection and other Trend Micro security products. Deploying Trend Micro Endpoint Encryption helps ensure that your data will continue to be protected as your mobile computing devices and organizational needs change.
Stormshield Data Security is ranked 18th in Endpoint Encryption while Trend Micro Endpoint Encryption is ranked 8th in Endpoint Encryption with 5 reviews. Stormshield Data Security is rated 0.0, while Trend Micro Endpoint Encryption is rated 7.8. On the other hand, the top reviewer of Trend Micro Endpoint Encryption writes "An encryption tool that is easy to install and configure". Stormshield Data Security is most compared with , whereas Trend Micro Endpoint Encryption is most compared with Microsoft BitLocker, Carbon Black CB Defense, Symantec Endpoint Encryption, Sophos SafeGuard and McAfee Complete Data Protection.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.