TREND MICRO Endpoint Encryption Reviews & Product Details

Are you from this Company?
Endpoint Encryption
Tokyo, Japan
1988
$1BN to $5BN
Enterprise
84 Likes
63 Buyers Negotiating

Summary

Trend Micro's SecureCloud solution secures critical data on the cloud and virtual environments by providing encryption, which is supported with policy-based key management and unique server validation. It supports data protection on the private cloud, public cloud, and virtual environments. SecureCloud extends its support to Amazon EC2, Eucalyptus, vCloud, RightScale, TCloud, VMware ESX and vSphere, and other virtual environments. SecureCloud delivers keys to the devices in a secure way, and there is no requirement for the deployment of the file system and management infrastructure. SecureCloud aids in data privacy, regulatory compliance, and secure storage recycling. It helps customers to remain compliant with internal cybersecurity policies and government regulations, such as HIPAA, HITECH, Sarbanes-Oxley, GLB, and PCIDSS. The encryption algorithms utilized for cloud data encryption are based on AES 256 bit. SecureCloud secures data, metadata, and associated structures without reducing performance and operational efficiency.

Discussions

Discussions (1)
Buyer
Raja Kamidi's requirement
08/11/2021
"Looking for field, file encryption"
Like
Comment
Strengths
  • +12
    Professional Services
  • +5
    Consulting Service
  • +14
    Support and Maintenance
  • +6
    Training and education
  • +9
    On-Site Support
  • +10
    Remote Support
  • +9
    AES
  • +10
    IaaS
  • +8
    SaaS
  • +7
    Large Enterprises
  • +10
    Cloud
  • +14
    Directly
  • +9
    On-Premise
  • +5
    Through Partners / Third-Party Vendors
  • +12
    Cloud Encryption
  • +11
    Communication Encryption (Voice email, and message)
  • +13
    Data Encryption
  • +14
    Data Loss Prevention
  • +8
    Disk Encryption
  • +9
    File/Folder Encryption
Cautions
  • -8
    SMEs
  • -6
    Application-level encryption
  • -11
    Data-in-motion encryption
  • -5
    File level encryption
  • -14
    Virtual machine instance encryption
  • -13
    Managed Services
  • -10
    Customer Redressal Mechanism/Program
  • -9
    Level of Support
  • -10
    Patented inhouse algorithm
  • -9
    PaaS
  • -10
    Database and Application Encryption
  • -5
    Tokenization
  • -7
    Others
  • -8
    Application-level tokenization
  • -7
    Column-level encryption
  • -12
    Data-at-rest encryption
  • -13
    Data-in- process/use encryption
  • -11
    Others (RSA, Blowfish, DES)
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup