Coming October 25: PeerSpot Awards will be announced! Learn more
2019-11-13T05:28:00Z
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 4

What needs improvement with Trend Micro Endpoint Encryption?

Please share with the community what you think needs improvement with Trend Micro Endpoint Encryption.

What are its weaknesses? What would you like to see changed in a future version?

7
PeerSpot user
7 Answers
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Reseller
Top 5Leaderboard
2022-04-25T09:34:27Z
25 April 22

In the next release, it would be better if it was more user-friendly. It is a little complicated for the average technical person. If they can make it more user-friendly, it would be much easier and more helpful.

BobenGeorge - PeerSpot reviewer
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
Top 5Leaderboard
2021-09-17T09:51:00Z
17 September 21

I would like to see more integration. More feasible / secure cloud-based solutions need to arrive. I'd like to see better integration with administrative tools & Active Directory integration.

Abdulla Pathan - PeerSpot reviewer
Technology Competency and Solution Head at LearningMate
Real User
Top 5Leaderboard
2021-06-07T13:28:00Z
07 June 21

We would like to see a wider, better dashboard for the purposes of monitoring the users of the Trend Micro software. The solution should also send out real-time data. This way, if a user becomes disconnected, the IT members can ensure that the associate, the developers are aware that he is out of the security zone.

Enayat Galsulkar - PeerSpot reviewer
Senior Information Security Consultant at Future Telecom
Real User
Top 5Leaderboard
2020-08-06T06:44:00Z
06 August 20

Improvement of the solution could be made in relation to integration and support. For instance, quarantining endpoints which are reflected into a container, and not allowing the traffic to pass is something that you would expect from integration. It should inform the other devices on the network that there is a malicious endpoint, which has been quarantined. That EDR capability is not there.

it_user1283538 - PeerSpot reviewer
Presales Engineer at a tech services company with 11-50 employees
Real User
2020-02-17T07:42:00Z
17 February 20

In terms of what must be improved, I would say the support, the next feature, and the road map. I think all these must be improved, but the important thing to improve is the support. I would like to see next-gen anti-virus included in the next release.

Sanjeet Kumar Bhuyan - PeerSpot reviewer
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
2020-01-26T09:26:00Z
26 January 20

There are a couple of bugs in this solution and these are creating a very large transaction log in the database, sometimes reaching 300GB, which is very annoying. It causes the database to get stuck at times. We are having some challenges with the network configuration and with one hostname, the IPs are getting changed. We have reported this to Trend Micro. It would be great if this solution had support for file integrity monitoring.

Find out what your peers are saying about Trend Micro, Microsoft, Broadcom and others in Endpoint Encryption. Updated: October 2022.
635,513 professionals have used our research since 2012.
AA
Network Administrator at a consultancy with 51-200 employees
Real User
2019-11-13T05:28:00Z
13 November 19

To improve Trend Micro Endpoint Encryption, the user interface could be somewhat more friendly. It is already friendly, but it can not be approached through to the exact issue and just to give you the full detail of each and every port graphically. We are very happy with the product. I have seen a lot of products. They are almost similar, but I believe in the Trend Micro model. I don't know why, exactly, except that I have built some trust in the product because I'm dealing with different endpoint solutions for almost 15 years now. I never faced any issue with a virus in my environment using Endpoint. We are protected at all points, all clean, all the time. No attacks from the outside.

Related Questions
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Mar 11, 2020
I am the CEO of a company that provides network security and information security solutions to corporate and enterprise companies. I am currently researching security solutions. What is the biggest difference between Kaspersky Endpoint Security, Trend Micro Endpoint Encryption, Symantec Endpoint Encryption, and McAfee Complete Endpoint Protection?  Thanks! I appreciate the help. 
MA
User Support Specialist at a healthcare company with 10,001+ employees
Feb 19, 2020
I am an Information Technology professional with experience working in business, government, and education. We are currently evaluating BitLocker with Windows 10 and Trend Micro Endpoint Encryption. What are the advantages and disadvantages of these products? Does either one have any clear advantages? Thanks! I appreciate the help. 
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Aug 09, 2022
If you’re weighing your options for endpoint security solutions, there are many options out there. However, solutions vary greatly in terms of how effectively they can protect your network. I want to help you make the best decision possible, so here are some questions to ask before buying an endpoint security solution, and why they are important. 1) Does the solution employ Foundational Tech...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Jul 11, 2022
Hi community members, As usual, this new Community Spotlight shares with you the latest articles, questions and trending discussions from your peers. Trending See what is trending at the moment and chime in to discuss! Top 8 Extended Detection and Response (XDR) Tools 2022 Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons? What is the...
See 2 comments
Ravi Suvvari - PeerSpot reviewer
Performance and Fault-tolerance Architect with 1,001-5,000 employees
30 May 22
Good very informative
Jairo Willian Pereira - PeerSpot reviewer
Information Security Manager at a financial services firm with 5,001-10,000 employees
11 July 22
Analyze the wave of product at Gartner Hype Cycle. EDR was good in the past. After that, MDR joined the hype and now, XDR is the trend. Wait for more in a couple of months and (sic) know the ZDR!
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 25, 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why. You can read user reviews for the Top 8 Endpoint Encryption Tools to help ...
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Apr 08, 2022
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to stay up to date on the most recent trends in order to be well prepared for tackling ever increasing ...
See 1 comment
Stuart Berman - PeerSpot reviewer
CTO at a tech company with 11-50 employees
08 April 22
I agree with many of these observations.  A trend I noticed as a security professional was that putting bandaids on legacy technology buys little protection and the bigger your enterprise the harder it is to embrace newer safer technologies.  As an example, Microsoft Active Directory is entrenched in most organizations but is so complex and so relied upon it has become a major attack vector.  Newer offerings bring a compelling alternative but the difficulty in switching increases exponentially with the size and complexity of the existing environment.  Ultimately, even the cloud offerings (Web2) are being replaced by Web3 (blockchain-based) technologies offering Immutable file storage and backup today.
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Apr 04, 2022
Hi peers, This is our new Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members. Trending Is RPA beneficial for a healthcare organization? With the increasing risk of cyber attacks in the west, due to the war in Ukraine, how safe is your data in the cloud? Articles 8 Business Automation Ideas to Save Time and...
Related Articles
Shibu Babuchandran - PeerSpot reviewer
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Aug 09, 2022
8 Questions to Ask While Selecting an Endpoint Security Solution for Your Business
If you’re weighing your options for endpoint security solutions, there are many options out there...
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Jul 11, 2022
Community Spotlight #14 - Top XDR Tools and More
Hi community members, As usual, this new Community Spotlight shares with you the latest articles...
Download Free Report
Download our free Endpoint Encryption Report and find out what your peers are saying about Trend Micro, Microsoft, Broadcom, and more! Updated: October 2022.
DOWNLOAD NOW
635,513 professionals have used our research since 2012.