2019-11-13T05:28:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 3

What is your primary use case for Trend Micro Endpoint Encryption?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

6
PeerSpot user
6 Answers
LaithQuraam - PeerSpot reviewer
Operations and Sales Manager at Alpha Hub
Real User
Top 20
2022-07-20T10:46:42Z
Jul 20, 2022

Trend Micro Endpoint Encryption is used for our endpoints.

Search for a product comparison
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Real User
Top 5Leaderboard
2022-04-25T09:34:27Z
Apr 25, 2022

We use encryption to secure data and devices. In case you lose your device or your data, this is a major feature that covers everything through encryption.

BobenGeorge - PeerSpot reviewer
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
Top 5Leaderboard
2021-09-17T09:51:00Z
Sep 17, 2021

There are basically two ways it can be deployed. It can be deployed in the cloud or it can be deployed in your endpoint. All your endpoints can be encrypted in the firewall and all your files can be encrypted and stored in the cloud if it is a cloud deployment.

Abdulla Pathan - PeerSpot reviewer
Technology Competency and Solution Head at LearningMate
Real User
Top 5Leaderboard
2021-06-07T13:28:00Z
Jun 7, 2021

We utilize the latest version. The solution enables all the development and technical team members to work from home while, at the same time, ensuring the security of the work environment. It also protects us from cyber attacks and malware.

Sanjeet Kumar Bhuyan - PeerSpot reviewer
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
2020-01-26T09:26:00Z
Jan 26, 2020

Trend Micro Endpoint Encryption makes up part of our complete security solution. We have created some customized policies for our day-to-day applications. We use machine learning plus behavior analysis to track all of the malware and other threats that come in. We do research on them and publish advisories. We then create the list of IoCs for the endpoint, fully with the help of Trend Micro solutions. We are monitoring the web and also using user-based use cases. If a user is trying to access any malicious sites then it triggers an alert. At this point, we do immediate remediation for that and the system is isolated from the network. With that system out of the way, we can analyze and repair the problem.

AA
Network Administrator at a consultancy with 51-200 employees
Real User
2019-11-13T05:28:00Z
Nov 13, 2019

Currently, we are with Trend Micro as an antivirus solution and as our long-term plan to upgrade our solution to cover deep security services. So we plan to have it as not only the antivirus but as a complete endpoint security solution. Trend Micro has a very good knowledge base. Even with the extensive history of issues available with Microsoft and all the other companies, you will find that the first group to discover and document the issues is Trend Micro. They have a big knowledge base and a big team working to offer this solution. There are a lot of companies available on the market providing similar solutions, but you cannot compare them with Trend Micro as far as depth and disclosure.

Find out what your peers are saying about Trend Micro, Microsoft, Broadcom and others in Endpoint Encryption. Updated: November 2022.
654,658 professionals have used our research since 2012.
Related Questions
VICTOR CHINEDU OGONNA - PeerSpot reviewer
Data Operations Analyst at a retailer with 51-200 employees
Oct 24, 2022
Hi Peers!  I am currently working as a Digital Operations Analyst at a Fashion Company in the UK, and am researching Trend Micro Endpoint Encryption and how it works. Why should we use Trend Micro Endpoint Encryption? What are the pros and cons? What are the policies and practices for implementing and managing Endpoint Encryption? Thanks for your help.
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Mar 11, 2020
I am the CEO of a company that provides network security and information security solutions to corporate and enterprise companies. I am currently researching security solutions. What is the biggest difference between Kaspersky Endpoint Security, Trend Micro Endpoint Encryption, Symantec Endpoint Encryption, and McAfee Complete Endpoint Protection?  Thanks! I appreciate the help. 
Download Free Report
Download our free Endpoint Encryption Report and find out what your peers are saying about Trend Micro, Microsoft, Broadcom, and more! Updated: November 2022.
DOWNLOAD NOW
654,658 professionals have used our research since 2012.