For any type of protection strategy, the natural use cases involve protecting sensitive data that shouldn't be public. For instance, in financial organizations—or really any organization with sensitive data—there’s something to lose. This is the type of data that you don't want exposed to the public, something that should be classified as confidential or for internal use only. Especially from the perspective of employee data, such as pay slips, this is critical. For example, if you and I work in the same organization, I should not be able to see your pay slip. Within the organization, there should be a classification level where data is categorized as internal, confidential, etc. My pay slip should only be viewable by me and the finance manager, not by any other employees or third parties. You want to classify your data, which can be done with the electronic data classifier, or you could leverage a third-party classifier like Titus or Boldon James Classifier. Both integrate very well with McAfee ePO and Trellix Data Protection, whether on-premises or in the cloud. They also integrate with Kaspersky or even Microsoft ERP, allowing data classification. Additionally, the out-of-the-box classifier that comes with the product can be used. By configuring policies, you can ensure that sensitive data is not shared with unauthorized individuals. For example, you can prevent sensitive data from being uploaded to the cloud, shared via email, sent to a printer, or copied to a USB stick. Protecting data, whether at rest, in motion, or in use, is essential. For USB sticks, you could implement protection by encrypting them using McAfee Removable Media Protection. For data at rest, encryption can be achieved with McAfee Drive Encryption. On Mac OS systems, you might manage native encryption or leverage BitLocker for encryption, ensuring that your systems are encrypted and that encryption keys are properly managed. These are basic use cases that any organization can leverage. It's not just for large organizations—any organization that is serious about securing its best interests should consider implementing data protection.
Senior Vice President IT at a tech services company with 11-50 employees
Reseller
Top 5
2023-12-15T05:31:00Z
Dec 15, 2023
We use McAfee Complete Data Protection to ensure compliance with regulations such as HIPAA, PCI, PII, and GDPR, ensuring that personal or confidential data remains within the organization.
We use the product for antivirus protection for all devices. We also use it for server protection for both Windows and Linux. We use endpoint encryption for laptops, too. Web protection is embedded in the browser.
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We have many clients in India using Complete Data Protection and host data protection. Complete Data Protection covers the network servers and endpoints. Okay. So with any species attachment scan with complete data production. Complete Data Protection was necessary to meet advanced customer requirements. We have around 2,250 users covered by Complete Data Protection.
Cyber Security Consultant & Presale at Innovery
Consultant
2022-07-07T12:20:14Z
Jul 7, 2022
I have a project with McAfee and a customer to deploy and roll out the solution for ADR and other components from the McAfee ecosystem. The entire solution is for endpoint security with the new component, ADR, the adaptive threat protection, and the TIE server, which is responsible for the threat information exchange between the product of the ecosystem. There’s a sandbox connected to the endpoint protection, to the ePolicy Orchestrator, and also the network security platform to connect the sensor for EPS or EDS. We have several components on top of the McAfee agent. Each component performs different activities. We have the base component that is the classic anti-malware, and then the endpoint security, which we call the endpoint security platform. We also have adaptive threat protection that can handle the reputation on file. If the file is unknown and the GTI (global threat intelligence) of McAfee doesn't know the reputation of a file, this file can be sent to the sandbox. Then, the sandbox analyzes the file to discover if it's zero-day ransomware or something else. They can then decide if the file needs to be blocked or if some other action needs to be taken. There’s the new component ADR on top of the solution from McAfee Complete Protection that can collect the index of items compromised inside the computer. All this information is sent to the cloud, to the console ADR in the cloud. We can analyze everything with the security operation center.
It can be used for all mobile works laptops, which are more susceptible to data loss. Or it can be used for file servers where you put your file servers on the cloud, and so the data addresses and transit are encrypted.
We primarily provide services to our clients. Clients usually use the solution mainly to audit GDPR compliance. As for the audit, they need to meet their compliance, the PCI DSS compliance, and GDPR compliance. Based on that they procure the DLP solution.
We use it, for example, for USB devices. When we are using USB devices, we have to put the password to open the USB stick. Without it, we cannot use the USB stick anywhere.
Lead Cyber Security Consultant at a security firm with 501-1,000 employees
Consultant
2021-02-19T13:11:13Z
Feb 19, 2021
We are a solution provider and this is one of the security products that we implement for our clients. I focus primarily on data protection and data loss prevention solutions, and in this role, I work with McAfee Complete Data Protection a lot. We also use it for encryption. A simple use case would be keywords and reject detection. Other reasons that we use it are for PII and PCI compliance.
Technical Security Engineer at Hitachi Systems, Ltd.
Real User
2021-01-23T11:46:00Z
Jan 23, 2021
The main use case of this solution is identifying bad actors (criminals) who want to steal data and locking them out of areas that require authentication.
We are system integrators who do the implementation and provide support for a variety of products. One of our main areas of focus is endpoint security, along with data loss prevention, encryption, and web security. McAfee Complete Data Protection is one of the security solutions that we implement for our customers. It is the best match for GDPR compliance.
I am actually very familiar with the on-premises solution. I am just starting to try out the cloud version. I have not really had the opportunity to exercise the capabilities fully because I need to buy the license to do that. I work with Cyber Security Africa Distribution, but even being that type of organization we still have to purchase our license to try the full solution. I have seen it work with the MVISION Cloud, but I have not tried out the data protection path. But I have reviewed all the features.
Senior Cyber Security Consultant at Ingram Micro Inc.
Real User
2020-03-16T06:56:17Z
Mar 16, 2020
Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.
Application Programmer (Infrastructure and OA support) at a government with 11-50 employees
Real User
2020-03-10T08:19:00Z
Mar 10, 2020
We primarily use this solution for folder and disk encryption. One encrypted folder in Drive D: for each PC user and disk encryption for all notebook PCs, especially for sensitive or confidential data.
Presales Manager at a computer software company with 501-1,000 employees
Real User
2019-12-23T07:05:00Z
Dec 23, 2019
We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution. Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home. Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.
Global IT Manager at a pharma/biotech company with 501-1,000 employees
Real User
2018-04-12T05:41:00Z
Apr 12, 2018
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices...
It helps prevent my machine from hacking and wireless attacks.
For any type of protection strategy, the natural use cases involve protecting sensitive data that shouldn't be public. For instance, in financial organizations—or really any organization with sensitive data—there’s something to lose. This is the type of data that you don't want exposed to the public, something that should be classified as confidential or for internal use only. Especially from the perspective of employee data, such as pay slips, this is critical. For example, if you and I work in the same organization, I should not be able to see your pay slip. Within the organization, there should be a classification level where data is categorized as internal, confidential, etc. My pay slip should only be viewable by me and the finance manager, not by any other employees or third parties. You want to classify your data, which can be done with the electronic data classifier, or you could leverage a third-party classifier like Titus or Boldon James Classifier. Both integrate very well with McAfee ePO and Trellix Data Protection, whether on-premises or in the cloud. They also integrate with Kaspersky or even Microsoft ERP, allowing data classification. Additionally, the out-of-the-box classifier that comes with the product can be used. By configuring policies, you can ensure that sensitive data is not shared with unauthorized individuals. For example, you can prevent sensitive data from being uploaded to the cloud, shared via email, sent to a printer, or copied to a USB stick. Protecting data, whether at rest, in motion, or in use, is essential. For USB sticks, you could implement protection by encrypting them using McAfee Removable Media Protection. For data at rest, encryption can be achieved with McAfee Drive Encryption. On Mac OS systems, you might manage native encryption or leverage BitLocker for encryption, ensuring that your systems are encrypted and that encryption keys are properly managed. These are basic use cases that any organization can leverage. It's not just for large organizations—any organization that is serious about securing its best interests should consider implementing data protection.
We use McAfee Complete Data Protection to ensure compliance with regulations such as HIPAA, PCI, PII, and GDPR, ensuring that personal or confidential data remains within the organization.
We use the product for antivirus protection for all devices. We also use it for server protection for both Windows and Linux. We use endpoint encryption for laptops, too. Web protection is embedded in the browser.
We use the solution to manage all incoming and outgoing traffic of the user's laptop.
Actually, my customers use the solution for important documents. So, they usually use the DLP on-prem. They have an on-prem solution for DLP.
We use this solution for outfitting our customers. We have a hybrid deployment. We have many Complete Data products in versions 11.6 and 11.7.
We primarily use the solution to protect sensitive data and general protection.
We have many clients in India using Complete Data Protection and host data protection. Complete Data Protection covers the network servers and endpoints. Okay. So with any species attachment scan with complete data production. Complete Data Protection was necessary to meet advanced customer requirements. We have around 2,250 users covered by Complete Data Protection.
One of the best solutions for data loss protection.
@Evgeny Belenky DLP, device control, FRP and drive encryption.
I have a project with McAfee and a customer to deploy and roll out the solution for ADR and other components from the McAfee ecosystem. The entire solution is for endpoint security with the new component, ADR, the adaptive threat protection, and the TIE server, which is responsible for the threat information exchange between the product of the ecosystem. There’s a sandbox connected to the endpoint protection, to the ePolicy Orchestrator, and also the network security platform to connect the sensor for EPS or EDS. We have several components on top of the McAfee agent. Each component performs different activities. We have the base component that is the classic anti-malware, and then the endpoint security, which we call the endpoint security platform. We also have adaptive threat protection that can handle the reputation on file. If the file is unknown and the GTI (global threat intelligence) of McAfee doesn't know the reputation of a file, this file can be sent to the sandbox. Then, the sandbox analyzes the file to discover if it's zero-day ransomware or something else. They can then decide if the file needs to be blocked or if some other action needs to be taken. There’s the new component ADR on top of the solution from McAfee Complete Protection that can collect the index of items compromised inside the computer. All this information is sent to the cloud, to the console ADR in the cloud. We can analyze everything with the security operation center.
It can be used for all mobile works laptops, which are more susceptible to data loss. Or it can be used for file servers where you put your file servers on the cloud, and so the data addresses and transit are encrypted.
We primarily provide services to our clients. Clients usually use the solution mainly to audit GDPR compliance. As for the audit, they need to meet their compliance, the PCI DSS compliance, and GDPR compliance. Based on that they procure the DLP solution.
We have huge clients, like Toshiba, Bangalore International Airport, Viacom, and other companies.
We use it, for example, for USB devices. When we are using USB devices, we have to put the password to open the USB stick. Without it, we cannot use the USB stick anywhere.
We are a solution provider and this is one of the security products that we implement for our clients. I focus primarily on data protection and data loss prevention solutions, and in this role, I work with McAfee Complete Data Protection a lot. We also use it for encryption. A simple use case would be keywords and reject detection. Other reasons that we use it are for PII and PCI compliance.
The main use case of this solution is identifying bad actors (criminals) who want to steal data and locking them out of areas that require authentication.
We are system integrators who do the implementation and provide support for a variety of products. One of our main areas of focus is endpoint security, along with data loss prevention, encryption, and web security. McAfee Complete Data Protection is one of the security solutions that we implement for our customers. It is the best match for GDPR compliance.
I am actually very familiar with the on-premises solution. I am just starting to try out the cloud version. I have not really had the opportunity to exercise the capabilities fully because I need to buy the license to do that. I work with Cyber Security Africa Distribution, but even being that type of organization we still have to purchase our license to try the full solution. I have seen it work with the MVISION Cloud, but I have not tried out the data protection path. But I have reviewed all the features.
Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.
We primarily use this solution for folder and disk encryption. One encrypted folder in Drive D: for each PC user and disk encryption for all notebook PCs, especially for sensitive or confidential data.
We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution. Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home. Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.
We primarily use the solution for endpoint protection, data loss prevention and application whitelisting.
This solution helps us to protect and secure our data.
I use this solution to protect my notebook. This is an on-premise deployment that was installed by my company on my notebook.
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.