Try our new research platform with insights from 80,000+ expert users

HP Wolf Security vs McAfee Total Protection for Data Loss Prevention vs Symantec Endpoint Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Endpoint Protection Platform (EPP)
Data Loss Prevention (DLP)
Endpoint Protection Platform (EPP)
 

Featured Reviews

BH
Adds a layer of safety, especially for laptops operating in various environments
The tool's deployment is easy. HP Wolf Security's deployment was a swift process since it was initially compatible with Windows 10, the operating system on both machines. However, when I transitioned to Windows 11, I encountered minor issues that prompted me to delve deeper into Wolf Security to fine-tune security settings according to my preferences. While I mostly used default settings, there was an initial adjustment where I disabled the AI function related to malware. Currently, the system is running smoothly with no reported issues. Adjusting some settings raised concerns about compatibility between HP Wolf Security and Norton 360. Specifically, aspects of HP Wolf Security, such as the virtual machine component, intrigued me, but I hesitated due to potential conflicts. During my investigation, Windows 11 raised a flag, questioning the system's security settings with Norton 360 and HP Wolf Security. However, it seems that they coexist well without causing issues.
VivekGupta7 - PeerSpot reviewer
Versatile with good patching and a straightforward setup
There is some fine-tuning needed, even once you define something. We need to do a lot of configuration. It would be easier if they made the configuration simpler, especially in the beginning. They need to give the user more choices and provide more guidance to help avoid problems later on. We'd like some more built-in predictive analytics so we can be prepared for what might happen in the future. We did have some bandwidth issues during setup. If your update fails, you may have stability issues. We find it difficult to reach higher levels of support when we face larger issues.
Hakeem_Abdulkareem - PeerSpot reviewer
The solution has given us visibility into compliance within our whole system and helped us ensure everything is updated
Symantec's application security module needs some improvement. You need to create a lot of fingerprints for application security. For instance, let's say I have different brands of ATMs in my environment, like Wincor and NCR. I use GRG to deploy an application control to whitelist some applications. I have to get the exact image of the different models of ATMs. When I tested in the past, some machines would not connect to the server without that. Only the approved software on the ATM should run. Anything outside that should not even come up at all. We did this so that an outside person doesn't introduce malicious software to the ATM. That's the essence of locking down with application control. Using Symantec for application control has been hectic, so I use Carbon Black to do the lockdown. Checking that data security will work fine with Carbon Black. Carbon Black worked fine. Setting up approval in Carbon Black works differently than Symantec. In Symantec, we first need the fingerprints of the applications running underneath. Before setting up Carbon Black, you first install the agent, allowing it to learn the environment. It will analyze all the software's behavior and provide recommendations for what should be allowed. It's more straightforward, whereas configuring application control in Symantec is a bit cumbersome.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The isolation feature is the most important because it prevents attacks."
"I use HP Wolf Security to add a layer of safety, especially for laptops operating in various environments."
"Now, instead of us having to go through that analysis, they actually give us a monthly report that shows us: "Here's what you got hit with, here's what would have happened, here are the forensics behind the attack," and, obviously, Bromium stopped it."
"Our overall security posture has absolutely improved as a result of adding Bromium to our security stack. We continue to have less user impact through a significantly reduced amount of malware infections. It's become a non-event."
"The feature that stands out the most is that when someone clicks on a link in an email... [if] that link is malicious and it has some malware or keylogger attached to it, when it opens up in that Bromium virtualized browser, there's no chance of it actually being on the machine and running, because as soon as they click that "X" in the upper right-hand side of the browser, everything just vanishes. That is an added plus."
"It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
"We've been able to isolate and prevent malicious code from external email attachments and from downloaded internet files. Those are the two big areas that have really made an impact."
"The most valuable feature is the process isolation because it simply stops malware from infecting the machines."
"Enables customization of file types and for different scenarios."
"The initial setup process was easy."
"The most valuable feature is the ability to control access to USB drives and other external devices."
"It can scale."
"The most valuable feature right now is the user control."
"What I like about McAfee Total Protection is that it's working. I also like that it doesn't require any specific knowledge to set up."
"The product provides us with an excellent, dependable solution to recommend to clients for their security needs."
"The most valuable features of McAfee Total Protection for Data Loss Prevention are the DLP. The DLP, data loss prevention is the most important feature right now that users are looking for."
"The dashboard view and reporting are valuable. It is stable and easy to integrate, and it provides custom options."
"The valuable features are device control, SONOR, and anti-virus."
"If there is exposure, we need to investigate the source of the attack, e.g., whether it came from the network or externally. We view the firewall logs, and if there has been exposure, then we use the Application Isolation feature. When there is an attack with on-prem, that system will go into isolation mode, removing connectivity to other internal systems. We also restrict the WLAN part to avoid that system broadcasting to other networks."
"The incident response capabilities allow me to resolve authentication and support issues promptly, ensuring the system operates without downtime."
"Some important features that are included are the built-in firewall and device control."
"The initial setup is very simple and straightforward."
"This solution has helped us because it is really useful for blocking all kinds of viruses."
"The tool has predefined rules, like which actions to block or allow. This makes it easy because I don't have to figure out what policies to deploy."
 

Cons

"When you deploy, not only is the user asked to reboot their computer, they are also asked to wait for 20 minutes while it sits there and initializes. It definitely impacts the end-user. It takes time away from their day."
"After a major release, there's always a lot of "dust settling." You have to work through all those issues and then you're fine for a while. The problem is, it's stable, it's fine, until the next major release comes out. Then you go back into the cycle again of uncertainty, instability, working through issues until they have patched and remediated all the problems that you're having. It's not unlike any other vendor though"
"The tool behaves differently when I ported to Windows 11."
"They need to improve the compatibility with other applications and its stability. It works well with attacks, but it doesn't work well with all software on the clients. There is a lot of troubleshooting and a lot of things that need to be tuned to make it work and not break things."
"Initial setup was complex. There were many configurations that needed to be worked out with the vendor. The setup required hands-on assistance from Bromium."
"They have always struggled with usability. The protection that it offers you is tremendous, but there's definitely an impact with use of resources on the computer. It's gotten a lot better now with Win 10. But sometimes, when you open up a website, it's going to take longer than it would without Bromium, and it's the same with documents."
"Initially, when we came in contact with Bromium a few years ago, it had a nice threat analyst, or a LAVA Pop, which is what they used to call it. Once it detected malware, it would show us the malware's path... I don't see that on the computers now. We only get to see that in the console. I would like to still see that on the individual machines because when we go out to look at a machine, we don't necessarily have access to the console."
"I did not find this to be an out-of-the-box solution, it required planning and alignment across many groups."
"Integration with other vendors could be improved. For example, with Chrome or Firefox."
"It could improve how it deals with solar data."
"Our client is not very happy with the lack of support, the skills, and the effectiveness of the tool."
"Lacks GDPR regulations to enhance security."
"The support from McAfee Total Protection for Data Loss Prevention is good. However, if they provided 24 hours a day seven days a week support that would be a helpful addition."
"I would like the solution to improve the AI features for anti-virus detection. I also want the software to include a tool for malware detection."
"McAfee Total Protection for Data Loss Prevention needs to improve the resources it uses for CPU and RAM."
"The product uses a lot of resources and because of this it is not always a good solution for every situation."
"The whitelisting feature does not work as expected."
"Multi-domain policy options for exceptions and global blocks."
"Technical support could be more responsive."
"The support can be wanting. Sometimes the time to resolution is longer than I would expect."
"We were having a problem in Version 14, where the client machines used to go into the health state and once it restarted, and never came back again."
"The enterprise edition does not report attacks on external devices."
"Since the acquisition by Broadcom, we are no longer receiving the proper support."
"When, Microsoft releases a new OS version twice a year, you never know if the current version of Symantec Endpoint Protection will support it. You can have a lag between when Microsoft releases a new client - and then the current version doesn't work correctly - and it could be some months between updates from Symantec."
 

Pricing and Cost Advice

"The product's pricing is a good value. We only run it on our internet-facing workstations, we don't run it on everything in our environment. We are very selective. Some organizations may want to consider doing something like that to reduce their license count."
"I think the pricing is a good value. All of these security products are always going to be very expensive, but I don't think Bromium is unreasonable. I think Bromium is decently priced. It’s a tiered licensing platform. The more you buy, the cheaper gets per unit, and I think their tiers are very well defined. I think they're fair."
"Pricing is reasonable."
"The product came as a bundle with the machine."
"The pricing is very fair compared to the competition. The licensing is straightforward."
"It's not a cheap option."
"I'm paying the license for McAfee Total Protection yearly. It could be cheaper, but it's fine."
"The price of McAfee Total Protection for Data Loss Prevention is expensive. It is not the most expensive solution but it is typically 15 to 20 percent higher than other solutions. There is no additional cost to using McAfee Total Protection for Data Loss Prevention."
"The pricing seems expensive both for the license and the support."
"There is an annual license to use this solution."
"The price is high for this type of product."
"The price of the solution could improve."
"If the client purchases the entire suite of McAfee Endpoint, the license is included."
"They're on the reasonable side. They are at mid-level. They're not too expensive as compared to their competitors. They're also not too cheap. In terms of price structure, hopefully, they could do a subscription."
"We pay on a yearly basis..."
"Each annual client license is around 1200 or 1600 INR."
"Regarding the licensing, it was important negotiate a long contract to get a more attractive price, including advanced support in case of crisis."
"I thought the pricing was reasonable."
"I am not sure of the initial cost, but the yearly renewals are quite affordable, which is a good thing. The price seems to have come down in recent years, and with the alternatives that are out there, such as Microsoft Defender, it needs to maintain that affordability to make it attractive."
"The pricing is a little bit more expensive than other competitors, if you compare it to Kaspersky, for example, or McAfee."
"Its price should be reasonable."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
842,592 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Comms Service Provider
9%
Government
8%
Retailer
7%
Computer Software Company
15%
Financial Services Firm
14%
Retailer
8%
Healthcare Company
6%
Computer Software Company
15%
Financial Services Firm
12%
Manufacturing Company
10%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What needs improvement with HP Wolf Security?
The tool behaves differently when I ported to Windows 11.
What is your primary use case for HP Wolf Security?
I use HP Wolf Security to add a layer of safety, especially for laptops operating in various environments.
What do you like most about McAfee Total Protection for Data Loss Prevention?
The tool focuses on endpoints rather than networks. Endpoints cover everything. It wouldn't be possible to steal conf...
Which is better - Cortex XDR or Symantec End-User Endpoint Security?
Aqua Security is easy to use and very manageable. Its main focus is on Kubernetes and Docker. Security is a very valu...
Which offers better endpoint security - Symantec or Microsoft Defender?
We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior sol...
What do you like most about Symantec End-User Endpoint Security?
Symantec have everything – documentation, videos, data sheets.
 

Also Known As

Bromium vSentry
McAfee Total Protection for Data, McAfee Total Protection for DLP, Total Protection for Data, Intel Security Total Protection for Data
Symantec EPP, Symantec Endpoint Protection (SEP)
 

Overview

 

Sample Customers

Valspar
Kleberg Bank
Audio Visual Dynamics, Red Deer Advocate, Asia Pacific Telecom Co. Ltd., Kibbutz Ein Gedi, and AMETEK, Inc.
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: March 2025.
842,592 professionals have used our research since 2012.