I use the MR services or active response, which scans actively on the machine.
IT system manager at NBO
Stable environment, with a good techincal support team, but needs segregated platforms for endpoints and servers
Pros and Cons
- "McAfee Complete Data Protection provides stability and is a good product."
- "They need to segregate McAfee Complete Data Protection for endpoints and servers."
What is our primary use case?
What is most valuable?
Our compliance department understands that we need a secure environment free from viruses.
What needs improvement?
They need to segregate McAfee Complete Data Protection for endpoints and servers. We need two different platforms one for endpoints and one for servers. This will provide stronger security from a compliance perspective.
For how long have I used the solution?
I have been using McAfee Complete Data Protection for a few years.
Buyer's Guide
McAfee Complete Data Protection
December 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
What do I think about the stability of the solution?
McAfee Complete Data Protection provides stability and is a good product.
What do I think about the scalability of the solution?
After we deployed McAfee Complete Data Protection we found it scalable.
How are customer service and support?
McAfee Complete Data Protection has a good technical support team.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did switch to see what the latest in technology trends are now and evaluate them.
How was the initial setup?
The initial setup was straightforward. In our case, we needed two individuals to deploy McAfee Complete Data Protection.
What about the implementation team?
We had a dedicated team to complete our deployment. This deployment required a year to implement. Larger organizations will take longer.
What's my experience with pricing, setup cost, and licensing?
We currently have a contract option with McAfee Complete Data Protection.
What other advice do I have?
I would recommend anyone interested in McAfee Complete Data Protection should do their own assessment. After they do their assessment then they can decide if the product is for them. I would rate McAfee Complete Data Protection a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Vice President IT at a tech services company with 11-50 employees
Excellent solution for data protection with robust features integrated seamlessly
Pros and Cons
- "It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution."
- "There's a limited coverage of operating systems. The marketing strategies need to change drastically."
What is our primary use case?
We use McAfee Complete Data Protection to ensure compliance with regulations such as HIPAA, PCI, PII, and GDPR, ensuring that personal or confidential data remains within the organization.
What is most valuable?
The product is completely data-based, and I have no words to say. It's truly amazing. It provides encryption, data protection, and DLP, all under one roof. Usually, many competitors don't offer such a consolidated and easily manageable solution. The deployment, scalability, and reporting is too good.
What needs improvement?
There are some areas that need improvement. Firstly, the limited coverage of operating systems is a concern, as McAfee Complete Data Protection currently supports only Windows, leaving out Mac and Linux users. Network DLP integration may not be an advantage then. Furthermore, no US security solution is included in the complete data protection. It is available on the CASB front.
Additionally, the availability of presentations and sample reports is lacking, making it challenging for presentations and road shows. The absence of roadshows in India from the solution's end is affecting the introduction of new technologies to Chief Administrative Officers (CAOs). The marketing strategies need to change drastically. I had a deal for seven thousand users, and there's a competitor ready to step in. Being a more aggressive partner could help secure deals and upsell other McAfee products to customers.
For how long have I used the solution?
We have been using this solution since the time of its inception. Presently, we are working with its latest version, which is 11.6.
What do I think about the stability of the solution?
My clients are satisfied with the stability of the product. I rate it a perfect ten.
What do I think about the scalability of the solution?
The solution is highly scalable. We exclusively cater to enterprise-level companies. Our client base ranges from a minimum of 6000 endpoints to a maximum of around 1,25,000 endpoints. I rate the scalability a nine out of ten.
How are customer service and support?
The technical support's response time and turnaround time as the solution provider are excellent. They go the extra mile to help us out by assisting us with log analysis and various aspects. Unlike other vendors who might refuse to help, the support here is great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Forcepoint is a competitor. However, McAfee Complete Data Protection stands out mainly due to its exceptional backend support. The availability of great back-end and process support makes the product great.
How was the initial setup?
The initial setup is straightforward, with simple configurations and the availability of a comprehensive dictionary that is used in covering most compliances. While many are transitioning to cloud deployment, the current setup is still on-premises and requires expertise for proper implementation.
Setting up everything can be done in a day if you have the necessary knowledge and resources. Personally, I've successfully implemented it for 6000 endpoints within a week.
What's my experience with pricing, setup cost, and licensing?
When it comes to pricing, I've observed an increase recently.
What other advice do I have?
I recommend the solution. Overall, I rate it a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
McAfee Complete Data Protection
December 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
Security Specialist at Hitachi Systems, Ltd.
Stable solution that fulfills our customers' requirements
Pros and Cons
- "All of the Complete Data products are valuable."
- "Initial setup was complex."
What is our primary use case?
We use this solution for outfitting our customers.
We have a hybrid deployment.
We have many Complete Data products in versions 11.6 and 11.7.
How has it helped my organization?
Complete Data products have helped our organization. For example, some customers require that we have products with Bluetooth, pen drives, hard drives, and external and internal drives for logging into our organization.
What is most valuable?
All of the Complete Data products are valuable. We haven't had any issues.
What needs improvement?
We had to migrate and upgrade the DLP, and then customers were experiencing some unknown issues. We had to upgrade the Microsoft package on our system.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
We haven't had any issues with scalability.
How was the initial setup?
Initial setup was complex.
What other advice do I have?
I would rate this solution as 10 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
VP - Cyber Security at a manufacturing company with 11-50 employees
Straightforward to set up and easy to expand but needs to be more compatible across different systems
Pros and Cons
- "I have found the USB part most valuable."
- "The disk encryption can be improved."
What is our primary use case?
We are using it internally for the company.
We are using it for two things. One is for the disk encryption on the machines, on the laptops and the other is for USB protection.
What is most valuable?
I have found the USB part most valuable.
The disk encryption is great.
It is straightforward to set up.
The solution can scale well.
What needs improvement?
The disk encryption can be improved.
They need to improve the performance of the USB protection module, which is where I'm seeing many issues come up. And for the hard disk encryption, they should have a much easier deployment method for different laptops and desktops. New customers should test it first. If a new customer, let's say, has a standardized set of laptops and desktops, then it is not a problem for them. However, if they have a variety of systems, they could have a problem. They need to improve the compatibility across different systems.
For how long have I used the solution?
I've been using the solution for more than four years.
What do I think about the stability of the solution?
I'd split the stability between the disk encryption and the USB protection parts of the solution. For USB protection, the stability has been very poor, actually, over the past year. It is more the end user systems utilization, CPU, or memory that is getting increased. Other than that, it's stable.
What do I think about the scalability of the solution?
It is not a challenge to scale as necessary.
We have 20,000 people using the solution. That's end users across all roles. It's used by the entire organization, in essence.
Right now, I have no plans to increase usage in the future. However, it'll all depend on how my user base increases. The solution would match any growth in my user base.
Which solution did I use previously and why did I switch?
We started with McAfee. It's been more than four years since I joined the organization - after the McAfee rollout started.
How was the initial setup?
The solution is simple to set up and easy to implement. I'd rate the ease of implementation a four out of five.
We were able to implement everything within three months. It wasn't overly difficult.
What about the implementation team?
We did the implementation in-house. We did not need outside help. We didn't use integrators or consultants.
What was our ROI?
I have witnessed an ROI while using the product.
The product features are meeting some of our very edge cases. We sometimes have a lot of edge cases that are one-off cases or which are unique in nature. The rich feature set of this product can meet those edge cases.
We could deploy the product internally rather than use an external consultant, and it was fairly easy to deploy. That also gave us a return on investment rather than engaging with external partners.
It's easy to manage, aside from issues around performance. That said, overall, it's easy to manage, and we can have an internal team manage rather than look for outsourced partners.
What's my experience with pricing, setup cost, and licensing?
The licensing is based on a three-year contract.
I'm not aware of the cost itself. The price negotiation is done by a different team. I wouldn't have insight into the exact cost.
That said, my understanding is that it is competitive. I'd rate it 3.5 out of five in terms of affordability.
What other advice do I have?
It has multiple components. I don't remember the exact version number we are on, however, we are on the latest version.
I would recommend potential new users do extensive testing with the latest version due to the stability or the performance issues we have seen in their latest versions. We are using the latest versions, and it is in the newer versions where we've seen performance issues. So test with the latest versions first and test on a variety of laptops and desktops.
I'd rate the solution five out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Manager at a computer software company with 501-1,000 employees
Gives accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss
Pros and Cons
- "With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution."
- "The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs."
What is our primary use case?
We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution.
Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home.
Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.
What is most valuable?
Often the customers have requirements where we need to provide them with endpoint DLP (Data Loss Prevention) solutions. McAfee's DLP is a very good product. It gives you accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss. This is what I think is the most valuable feature in the solution.
What needs improvement?
The improvement that I think most needs to be addressed is a claim from many customers that I receive all the time. They say that the product consumes too much RAM and CPU. It makes clones in the machine and that eats up resources.
It makes the clone as long as it is running on the machine. The problem is big enough for users that I need to have another smart, reliable solution that can be deployed instead if the customer does not have the hardware to allow the product to consume the needed volume of RAM and CPU. If McAfee were able to do all it does without stealing so much of the resources on a machine, I would not have this problem of having to consider other deployments.
For how long have I used the solution?
We have been using the solution for between six or seven years. Earlier it was called VSP. At that time it was not complete all-in-one protection. It has been only for maybe two or three years they have changed the name to Complete Data Protection and made this well-integrated product.
What do I think about the stability of the solution?
From my point of view, the product is very stable and the support team is very responsive. If they release a new update and there was a bug or something, they release a patch or fix for it very quickly.
What do I think about the scalability of the solution?
The scalability of the solution is there. McAfee is one of the oldest security companies. They have been creating and releasing security solutions since 1987, so they know what they are doing and they do it well.
We deploy the solution to medium and enterprise clients so it can scale up and handle larger clients.
How are customer service and technical support?
Essentially, as a service delivery partner, we are also technical support to some level.
Which solution did I use previously and why did I switch?
Because we deploy for clients, we work with a variety of solutions in order to meet their needs. While I am working mostly with McAfee solutions, I'm also very familiar with the broader classification of security solutions. I have worked with various PAM (Privileged Access Management) solutions. I don't only work with McAfee portfolio or their security products but it is what I deploy most often. I am familiar with Symantec, LogRhythm SIEM solution, and Forcepoint. Also, I have worked with security solutions for USB, for the web, for email, and for secure file transfer solutions, so I am very familiar with a lot of security solutions and how they work.
The main difference between McAfee Complete Data Protection and other solutions is that McAfee has a strong point as a comprehensive security solution. With Endpoint Security, you don't have to have different management interfaces to manage your endpoint solutions. It all can be managed from one single server in one interface. This might be their main and most powerful advantage because users do not have to mix and matching various products to accomplish what a security suite can. They also do not have to deal with potential incompatibilities.
How was the initial setup?
The initial setup is something I have done often so it is very clear how to do it and it is easy for me.
On average it takes very little time to deploy. For the management console EPO (ePolicy Orchestrator) it is a maximum of maybe half an hour for it to be deployed. It depends on the server. Deploying the endpoint from the management console also does not take much time. If the network and the firewall ports are open, normally it takes only 5 to 10 minutes and you can deploy it in batches of 50 or 100 machines in each batch. So the total time depends on how many batches, but the installation on the machines can take as little as 5 to 10 minutes.
What about the implementation team?
We do all of our own implementations and the implementations for clients as well.
What other advice do I have?
The advice I have for people considering this type of security solution is not to listen to what all the companies advertise. You can see bad reviews, maybe good reviews as well, but you need to use that information from the reviews as a starting point for your own observations and not just believe what reviews say. I know some reviews on the internet are fair, but some reviews are not. Try to do a POC (Proof of concept) and conduct testing for yourself. Define your policies as per your requirements for your situation and your company and choose products that meet the needs of that model. If you want to install any solution with the default policies, it will probably not fit your requirements exactly. You will need to do enhancements and fine-tune the solution, so you will need a solution that can be tuned. Give the solutions a try. Do the POC for one or two months and then you can decide if it is a good solution for you.
On a scale from one to ten where one is the worst and ten is the best, I would rate this product as an eight of ten. To make it ten or even a nine, they need to resolve the issues with how the solution consumes PC resources.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Cyber Security Consultant at Ingram Micro Inc.
Excellent protection that is easy to use with simple access to the DLP
Pros and Cons
- "The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage."
- "The solution needs more advanced features."
What is our primary use case?
Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.
What is most valuable?
The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.
The solution is simple.
Accessing the DLP is easy.
What needs improvement?
The solution needs more advanced features.
Customers tend to not like the navigation that is offered.
While accessing the DLP is easy, navigating inside of it is difficult.
The policies and propagation need to be improved.
The solution should integrate more into the Cloud. McAfee is not focusing too much on the Cloud. They need to do so.
For how long have I used the solution?
I've been working with this solution for about 16 to 18 months.
How are customer service and technical support?
We've contacted technical support in the past and in general, they are quite good.
Which solution did I use previously and why did I switch?
We've previously used Symantec and Trend Micro. They all have similar features. All of them use privacy encryption technology, and they are all simple in terms of just deploying the agent. They offer encryption of the endpoint. There's no major difference between any of them.
How was the initial setup?
The initial setup is straightforward. It's not complex. They make it very easy to implement the solution.
For a company with approximately 100 users, deployment takes approximately ten to eleven days.
What other advice do I have?
I'm a consultant. Our company is a partner as well as a distributor.
I would recommend companies who want some solid security products to consider this solution. McAfee is well known in the market, and it has a good reputation specifically surrounding the EPO encryption. I would recommend them.
I'd rate the solution eight out of ten. I'd rate the solution higher if the navigation to the settings and propagation were more clear inside McAfee.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Allows me to define rules that protect the database beyond the built-in rules
Pros and Cons
- "In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability."
- "A better GUI platform would make it easier to present information to management; I would not need to fix the data before I present it."
What is our primary use case?
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more.
I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.
How has it helped my organization?
The improvement is from the management point of view because, when implementing database security, you don't see any improvement in performance or productivity. The purpose of the product is to give visibility to management that the heart of the company is secured in the maximum way possible, and this solution is giving us that.
The report that I present to the management team shows this, that it's safe, that we are monitoring the database all the time, and the vulnerability of the database is prevented, thanks to this solution. The improvement is the security that it provides.
What is most valuable?
With this product, the performance of the database wasn't affected at all.
In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.
I came to this solution because there was a data leak from one of the internal users who was taking information from inside the company, from the ERP system. When she left the company, she was giving it to our competitors. I found a way with this product to also create a DLP solution. I got two products in one solution, so it is very efficient.
What needs improvement?
Maybe a better GUI platform; that would make it easier to present information to management, so I would not need to fix the data before I present it.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The stability is very, very good. I was very impressed that it didn't effect the performance of the database at all. At first I put it in monitoring mode, so I could see that it's stable, and not affecting the database performance. After a month running on monitoring, I put it in prevention mode, and it did it without any performance issues. So that was great.
What do I think about the scalability of the solution?
I think scalability is very good. You can grow the product, you can add more databases to it. It depends on the license that you purchase. You can grow with the product without any issues.
How are customer service and technical support?
I'm working with a security company called Intensity. After doing my own PoC, and also checking an IBM solution, I was fine with this product. Intensity, the partner, implemented the product, and they were working with customer support of the product.
Customer support is very good, because we didn't run into any issues that weren't resolved. The implementation ran very smoothly on Oracle Database. So I would evaluate support as very good.
Which solution did I use previously and why did I switch?
I didn't use database security before this. I was protecting the data of the company with other products, not directly on the database. But when we ran into data leaks from one of the users, I searched for a DLP solution. DLP solutions, to implement in a company, are very, very complex. So I searched for another solution that would gives us the same result but in a different way, and this product did it.
How was the initial setup?
It's not straightforward. You need to have database knowledge to know which parts of the data you want to protect within the database, to map your data and tables in order to make the rules. For the basic things that the product does, the knowledge you need is straightforward for system integration. But when you're diving into the product and you want to enhance the solution, you need a DBA to protect your database in a significant way, as I was implementing it.
Which other solutions did I evaluate?
I also evaluated Nyotron. I went with McAfee for the stability, that it's handled by McAfee and they are an experienced company.
What other advice do I have?
When you're searching for a vendor, first of all you want to be secure and comfortable with the partner that you're working with. The partner can see many vendors in the industry, and is working with many companies. When he's recommending a vendor, I'm more comfortable working with that vendor. So I'm listening to my partner's recommendation, and then I start to check out those vendors.
The criteria include that it is a stable vendor, has been in the market a long time, has a good solid, financial base so it can support the product that I'm working with.
My advice would be to speak with other companies who have implemented the solution to get references.
I would rate this solution a nine out of 10.
When I'm looking for a product like this, I don't want it to interfere with the performance of my database or system. The purpose of database security is to protect our ERP system database, and if the performance is going to be harmed or affected, from a business point of view that's a big issue. This product did not affect performance.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at IBoss Tech Solutions Pvt. Ltd
Easy to manage solution with good stability
Pros and Cons
- "The solution has a good interface."
- "The solution's pricing could be better."
What is our primary use case?
We use the solution to manage all incoming and outgoing traffic of the user's laptop.
What is most valuable?
The solution has good monitoring and interface features for the DPM layer.
What needs improvement?
The solution's pricing could be better compared to Kaspersky Endpoint Security.
For how long have I used the solution?
I have been using McAfee Data Protection for three to four years.
What do I think about the stability of the solution?
Stability-wise, the solution works properly.
What do I think about the scalability of the solution?
I rate the solution's scalability an eight out of ten. We have 150 users in our organization.
How are customer service and support?
The solution's customer support team's response time is good. We raise the ticket on a support portal and communicate with the technical team. They provide the best solution as soon as possible.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used Kaspersky Endpoint Security before. We switched to McAfee because of the pricing.
What other advice do I have?
The solution is easy to manage, configure, and monitor. It also has a good UI. I rate it an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Endpoint EncryptionPopular Comparisons
Microsoft BitLocker
ESET Endpoint Encryption
Symantec Endpoint Encryption
Trend Micro Endpoint Encryption
Sophos SafeGuard
Check Point Full Disk Encryption Software Blade
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Would you choose Microsoft BitLocker or McAfee Complete Data Protection?
- Which full disk encryption software should we chose?
- What is the difference between "data protection in transit" vs "data protection at rest"?
- What is the best email encryption software for small enterprises using Office 365?
- When evaluating Endpoint Encryption, what aspect do you think is the most important to look for?
- What should one take into account when replacing PGP with Microsoft BitLocker?
- Why do organizations need endpoint encryption?
- What are the main pros and cons of the various Endpoint Encryption solutions on the market?
- How can I tell if there is encryption on?
- What is the best endpoint encryption system?