Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Presales Manager at a computer software company with 501-1,000 employees
Real User
2019-12-23T07:05:00Z
Dec 23, 2019
With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution.
The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints.
Global IT Manager at a pharma/biotech company with 501-1,000 employees
Real User
2018-04-12T05:41:00Z
Apr 12, 2018
In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices...
It worked for me: it's easy to use and has been very effective.
It provides encryption, data protection, and DLP, all under one roof.
The deployment, scalability, and reporting is too good.
My clients are satisfied with the stability of the product.
The solution is highly scalable.
The technical support's response time and turnaround time as the solution provider are excellent.
The availability of great back-end support and process support makes the product great.
The initial setup is straightforward, with simple configurations.
I recommend the solution.
It works seamlessly as long as it's well configured and the policies have been put properly.
The solution has a good interface.
Reporting and encryption are its most valuable features.
All of the Complete Data products are valuable.
We can scale the solution.
Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device.
The console of the EDR is totally in the cloud.
It is part of the DLP and works well for that use case.
Technical support is very helpful.
With respect to data loss prevention, I think it is helpful to the customer.
The most valuable feature is security.
The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud.
I am satisfied with the customer service/technical support.
The interface is user-friendly and it provides a large number of options.
With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction.
The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.
The server software console is exquisitely designed and organized for handy access and manipulation by the administrator.
With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution.
The interface is very good. You can create and manage your own dashboard.
In the configuration, you can restrict a user from accessing a removable drive.
The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints.
It is capable of acting as Web control, Device Control, or Data Control.
With this solution, the device control is more reliable and more stable.
I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job.
In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.