Introducing G2.ai, the future of software buying.Try now
Tresorit
Sponsored
Tresorit
Visit Website
Product Avatar Image
Trend Micro Endpoint Encryption

By Trend Micro

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Trend Micro Endpoint Encryption and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.2 out of 5 stars

How would you rate your experience with Trend Micro Endpoint Encryption?

Tresorit
Sponsored
Tresorit
Visit Website
It's been two months since this profile received a new review
Leave a Review

Trend Micro Endpoint Encryption Reviews & Product Details

Value at a Glance

Averages based on real user reviews.

Perceived Cost

$$$$$
Product Avatar Image

Have you used Trend Micro Endpoint Encryption before?

Answer a few questions to help the Trend Micro Endpoint Encryption community

Trend Micro Endpoint Encryption Reviews (33)

Reviews

Trend Micro Endpoint Encryption Reviews (34)

4.2
34 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
anaim f.
AF
Information Technology System Administrator
Small-Business (50 or fewer emp.)
"Endpoint Encryption Software"
What do you like best about Trend Micro Endpoint Encryption?

Ease of implementation and Customer Support, ease to use Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

N/A

Actually from side viewthere is nothing any findout dislike. Endpoint encrption is power full and valuable for CO. and normal user's Review collected by and hosted on G2.com.

Dulana R.
DR
Information Security Engineer
Mid-Market (51-1000 emp.)
"Solution to secure all the endpoints"
What do you like best about Trend Micro Endpoint Encryption?

Trend Micro is easy to deploy, configure and maintain. Proper reporting mechanisms as well Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

For the moment I enjoyed the product sometimes high usage of resources from the agent was the only issue Review collected by and hosted on G2.com.

O'sniel S.
OS
Alluvial Mining Professional - Small Scale Mining
Small-Business (50 or fewer emp.)
"Seamless Endpoint Protection"
What do you like best about Trend Micro Endpoint Encryption?

The tightened security within the antivirus engine and core is new. Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

It does still interfere with quaranteeing system services. Review collected by and hosted on G2.com.

Verified User in Financial Services
AF
Mid-Market (51-1000 emp.)
"Encryption of laptop"
What do you like best about Trend Micro Endpoint Encryption?

This is good tool to encrpt your laptop and this is come along with trend micro total security suit and work well with end point encryption Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

Tis is not able to encrpt linux laptop also this solution not work with linux . Review collected by and hosted on G2.com.

HE
Software Designer
Small-Business (50 or fewer emp.)
"Encrypt server folder and specified folder."
What do you like best about Trend Micro Endpoint Encryption?

I like the folder management and encryption tool, direct and fast for PC and server. Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

Add extra service of independent applications to the service. Review collected by and hosted on G2.com.

LS
Investigator
Small-Business (50 or fewer emp.)
"Encrypt server document"
What do you like best about Trend Micro Endpoint Encryption?

Encrypt device, GNU Linux server and encrypt email point point Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

Encrypt GNU Linux ext4 server disk and decrypt, time-consuming Review collected by and hosted on G2.com.

Verified User in Hospital & Health Care
AH
Mid-Market (51-1000 emp.)
"Product meets our business needs, but could use additional functionality"
What do you like best about Trend Micro Endpoint Encryption?

Because the product uses its own pre-boot environment to manage keys instead of using TPM chips, it is not as susceptible to TPM chip failures, which we've found to be more common than expected. It also has what we feel to be a simpler recovery process than some native tools we've worked with. Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

It would be helpful if Trend could develop a SaaS offering for the management server, and it would be helpful if computers removed from Active Directory could be removed automatically from the management server interface. The interface itself is a bit clunky and feels outdated. It could use an update as well. Review collected by and hosted on G2.com.

Daniel W.
DW
Asesor superior de tecnologías de la información
Small-Business (50 or fewer emp.)
"Encryption of any type of device. "
What do you like best about Trend Micro Endpoint Encryption?

Trend Micro Endpoint Encryption has all the necessary technology for complete disk encryption, in addition to being able to encrypt any electronic device, it is remarkable that it is possible to enter a password, so that only the data will be readable by those who know the corresponding key, it is compatible with disk drives with automatic TCG OPAL and OPAL 2 SED encryption from various types of manufacturers, which ensures maximum compatibility regardless of the corresponding support.

Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

The program is highly effective, to date it works without problems, it is also very easy to perform the corresponding encryption regardless of the type of device, however if it were cheaper it would be better, the program is somewhat expensive.

Review collected by and hosted on G2.com.

Martin C.
MC
Portfolio Manager
E-Learning
Mid-Market (51-1000 emp.)
"Full disk and file encryption "
What do you like best about Trend Micro Endpoint Encryption?

Convenient user and administrator`s interface

Different types of encryption

Easy to integrate policy server and endpoint - takes a little time

No incompatibilities with other TM products

Supports apple devices

Also, Trend Micro Endpoint Security is part of Endpoint protection licence or Separate product

Trusted product: Trend Micro is world leading company

Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

I haven't seen troubles, system improves costantly

All issues are solved extremely operatively - 24/7 regional or support engineers helps with any customers questions. So when the problems appear - engineers will help you Review collected by and hosted on G2.com.

MT
Tecnico Superior Universitario en Administracion de Empresas
Mid-Market (51-1000 emp.)
"Protect your valuable information with Endpoint Encryption"
What do you like best about Trend Micro Endpoint Encryption?

Today I want to talk to you about a wonderful and powerful security solution for small, medium, and large businesses. It is Endpoint Encryption, a tool developed by Trend Micro. This tool is used to protect, encrypt, or encipher entire workstations and removable devices such as USB drives, external disks, memory cards, etc. And all of this can be done centrally from the console of this wonderful tool, which, by the way, is very easy to use and has a graphical interface that is very, very pleasant for its users. For this reason, it is the best tool of its kind that exists today, from my point of view, of course. Review collected by and hosted on G2.com.

What do you dislike about Trend Micro Endpoint Encryption?

In reality, for me, the tool works perfectly. It has been extremely useful, as it prevents information leaks. This is because from its console, you can configure which files can be extracted from your protected disk and which files cannot be extracted, thus avoiding information leaks, a critical issue that affects many companies today. For all the reasons expressed above, I can conclude by saying that I have no complaints about the tool. Review collected by and hosted on G2.com.

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Trend Micro Endpoint Encryption Comparisons
Product Avatar Image
Microsoft BitLocker
Compare Now
Product Avatar Image
Sophos Intercept X
Compare Now
Product Avatar Image
Trend Micro Endpoint Encryption
View Alternatives