Introducing G2.ai, the future of software buying.Try now

Compare Tor and Endpoint Encryption Software

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Tor
Tor
Star Rating
(43)4.4 out of 5
Market Segments
Small-Business (52.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Tor
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption
Star Rating
(34)4.2 out of 5
Market Segments
Mid-Market (53.6% of reviews)
Information
Pros & Cons
Not enough data
Entry-Level Pricing
No pricing available
Learn more about Trend Micro Endpoint Encryption
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Tor excels in Access Management with a score of 9.2, indicating robust features that allow for detailed control over user permissions, while Trend Micro Endpoint Encryption falls short with a score of 7.7 in the same category.
  • Reviewers mention that both products offer Email Encryption with equal effectiveness, scoring 8.3, but users on G2 highlight that Tor's implementation is more user-friendly, making it easier for small businesses to adopt.
  • G2 users note that Tor's Data Encryption capabilities are superior, scoring 8.6 compared to Trend Micro's 7.8, with reviewers praising Tor for its seamless integration into existing workflows.
  • Users say that while Trend Micro Endpoint Encryption has a higher score of 8.5 for Quality of Support, Tor's community-driven support is often cited as being more responsive and helpful in troubleshooting issues.
  • Reviewers mention that Tor's Policy Enforcement features, scoring 8.6, provide more flexibility and customization options compared to Trend Micro's lower score of 6.9, which some users find restrictive.
  • Users report that in terms of Full-Disk Encryption, both products are comparable, with Tor scoring 7.5 and Trend Micro at 7.6, but reviewers highlight that Trend Micro's setup process is more straightforward, making it easier for less tech-savvy users.
Pricing
Entry-Level Pricing
Tor
No pricing available
Trend Micro Endpoint Encryption
No pricing available
Free Trial
Tor
No trial information available
Trend Micro Endpoint Encryption
No trial information available
Ratings
Meets Requirements
9.0
39
8.9
22
Ease of Use
8.5
39
8.3
22
Ease of Setup
9.3
5
8.5
10
Ease of Admin
10.0
5
8.3
10
Quality of Support
7.3
31
8.5
22
Has the product been a good partner in doing business?
Not enough data
7.8
10
Product Direction (% positive)
8.5
40
7.5
23
Features by Category
Encryption
8.3
22
8.3
5
8.1
21
7.7
5
8.7
25
8.0
5
8.6
27
7.8
6
7.9
21
7.3
5
7.6
17
7.6
7
Compliance
8.6
19
6.4
6
8.7
21
6.9
6
9.3
20
7.7
5
Management
7.7
14
7.7
5
6.6
16
7.2
6
8.1
16
8.0
5
7.8
17
7.0
5
Categories
Categories
Shared Categories
Tor
Tor
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption
Tor and Trend Micro Endpoint Encryption are categorized as Encryption
Unique Categories
Tor
Tor has no unique categories
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption has no unique categories
Reviews
Reviewers' Company Size
Tor
Tor
Small-Business(50 or fewer emp.)
52.4%
Mid-Market(51-1000 emp.)
26.2%
Enterprise(> 1000 emp.)
21.4%
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption
Small-Business(50 or fewer emp.)
32.1%
Mid-Market(51-1000 emp.)
53.6%
Enterprise(> 1000 emp.)
14.3%
Reviewers' Industry
Tor
Tor
Computer Software
16.7%
Information Technology and Services
14.3%
Computer & Network Security
9.5%
Marketing and Advertising
4.8%
Internet
4.8%
Other
50.0%
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption
Information Technology and Services
10.7%
Computer & Network Security
10.7%
Retail
7.1%
Hospital & Health Care
7.1%
Financial Services
7.1%
Other
57.1%
Alternatives
Tor
Tor Alternatives
Progress MOVEit
Progress MOVEit
Add Progress MOVEit
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Signal
Signal
Add Signal
Virtru Email Encryption
Virtru Email Encryption
Add Virtru Email Encryption
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption Alternatives
Microsoft BitLocker
Microsoft BitLocker
Add Microsoft BitLocker
Progress MOVEit
Progress MOVEit
Add Progress MOVEit
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Signal
Signal
Add Signal
Discussions
Tor
Tor Discussions
What is Tor used for?
1 Comment
Kerby R.
KR
To access the dark web, and remain anonymous.Read more
Monty the Mongoose crying
Tor has no more discussions with answers
Trend Micro Endpoint Encryption
Trend Micro Endpoint Encryption Discussions
What are the features of encryption?
1 Comment
Keyur P.
KP
It is in total sure version, connect your vendor to guide youRead more
Monty the Mongoose crying
Trend Micro Endpoint Encryption has no more discussions with answers