I worked at McAfee, and we deployed the solution for our customers. The primary use case is policy management, as the solution supports robust policy management. The customer deployments were on-premises.
Cyber Security Consultant at a computer software company with 51-200 employees
Real User
2022-05-18T20:02:00Z
May 18, 2022
We use McAfee to detect patterns. For example, if we detect credit cards, we can use the advanced pattern. To maintain the solution, we require two individuals that are knowledgeable in SQL and DLP.
System Administrator at International Media Investments
Real User
2022-03-29T16:02:43Z
Mar 29, 2022
We have deployed McAfee ePolicy Orchestrator in the cloud and on-premise. We are using McAfee ePolicy Orchestrator mainly for device policy management. We have many different solutions that we manage with McAfee ePolicy Orchestrator.
Implementation Engineer at a tech vendor with 201-500 employees
Real User
2021-11-24T11:13:36Z
Nov 24, 2021
The use case differs based on each customer. I work with customers and try to understand their requirements, use cases, security challenges, and then I work on the project plan or design documentation so that I can help them configure their product.
Learn what your peers think about McAfee ePolicy Orchestrator. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
I use the solution for two things - as an antivirus for a spider scan enterprise and endpoint protection, and also to make application whitelisting, or application blocking, where we only allow certain applications to run on the server, in case the server has been compromised. That could mean our ePO scripts or anything might be compromised and it can't run. We install a plug-in so it won't run any executables which are not whitelisted. We're a cyber security company and a customer of McAfee.
Information System Security Coordinator at a comms service provider with 501-1,000 employees
Real User
2019-12-05T06:53:00Z
Dec 5, 2019
I am an information system security coordinator and our company is a customer of McAfee. We use the product internally. Our primary use case is for protecting workstations, and servers. We use the antivirus with several modules that have a threat intelligence exchange, DLP and threat protection. It is a firewall hosting through the prevention system, web control and adaptive threat protection. The solution is for workstations and Windows servers. Approximately 1,300 administrators use the product and we have two people responsible for backup.
Senior Network Security Planning at Ooredoo Kuwait
Reseller
2019-09-03T08:58:00Z
Sep 3, 2019
We have been using this solution for almost seven years. The primary use case for this solution is to protect our endpoints. We are using an on-premises deployment model.
I have been working with McAfee ePolicy Orchestrator since 2005. We are a service provider and system integrator, and this is one of the solutions that we provide for our clients. Most of the deployments we have done are on-premises.
It is an endpoint protection product. You use it to centrally manage security policies and push out configurations, then you manage the antivirus on endpoints. We use the on-premise deployment model.
Information Security Analyst at a tech services company
Real User
2019-06-13T05:55:00Z
Jun 13, 2019
We use McAfee Antivirus in our organization, as it is one of the best antivirus solutions on the market. We manage all of our endpoints centrally from the McAfee ePolicy Orchestrator console. We send signature updates and software updates to all of the agents that we are responsible for.
Senior System Engineer at a tech services company with 201-500 employees
Real User
2019-02-20T11:19:00Z
Feb 20, 2019
With this solution we use ENS with DLP. DLP works in controlling data protection when transferring data from PC to USB, USB to PC. We also use it for read-only access for hard disks. In DLP we have many options which we can work with. Currently, we are using it for the clipboard, where we cannot capture screenshots from the PC screen, as well as for USB locking/data transfer, and the hard disk protection.
I use McAfee as a solution to monitor our network log systems. I monitor logs and use it to be able to report incidents and get better internal vision.
McAfee ePolicy Orchestrator (McAfee ePO) is the most advanced, extensible, and scalable centralized security management software in the industry. Unifying security management through an open platform, McAfee ePO makes risk and compliance management simpler and more successful for organizations of all sizes.
We use McAfee ePolicy Orchestrator to see attacks in real time. We also use it for storage as well.
It's being used to protect our enterprise from viruses and malware.
I worked at McAfee, and we deployed the solution for our customers. The primary use case is policy management, as the solution supports robust policy management. The customer deployments were on-premises.
We use McAfee to detect patterns. For example, if we detect credit cards, we can use the advanced pattern. To maintain the solution, we require two individuals that are knowledgeable in SQL and DLP.
We have deployed McAfee ePolicy Orchestrator in the cloud and on-premise. We are using McAfee ePolicy Orchestrator mainly for device policy management. We have many different solutions that we manage with McAfee ePolicy Orchestrator.
The use case differs based on each customer. I work with customers and try to understand their requirements, use cases, security challenges, and then I work on the project plan or design documentation so that I can help them configure their product.
We're pretty much using it as a traditional AV.
We primarily use the solution in order to distribute the security features to all the nodes.
I use the solution for two things - as an antivirus for a spider scan enterprise and endpoint protection, and also to make application whitelisting, or application blocking, where we only allow certain applications to run on the server, in case the server has been compromised. That could mean our ePO scripts or anything might be compromised and it can't run. We install a plug-in so it won't run any executables which are not whitelisted. We're a cyber security company and a customer of McAfee.
We have a lot of endpoints and the major use case for us is to secure the endpoints. That includes computers, servers, etc.
The solution handles risk and compliance aspects for our company. It handles everything including uploading documents, etc.
I am an information system security coordinator and our company is a customer of McAfee. We use the product internally. Our primary use case is for protecting workstations, and servers. We use the antivirus with several modules that have a threat intelligence exchange, DLP and threat protection. It is a firewall hosting through the prevention system, web control and adaptive threat protection. The solution is for workstations and Windows servers. Approximately 1,300 administrators use the product and we have two people responsible for backup.
We have been using this solution for almost seven years. The primary use case for this solution is to protect our endpoints. We are using an on-premises deployment model.
I have been working with McAfee ePolicy Orchestrator since 2005. We are a service provider and system integrator, and this is one of the solutions that we provide for our clients. Most of the deployments we have done are on-premises.
It is an endpoint protection product. You use it to centrally manage security policies and push out configurations, then you manage the antivirus on endpoints. We use the on-premise deployment model.
We use McAfee Antivirus in our organization, as it is one of the best antivirus solutions on the market. We manage all of our endpoints centrally from the McAfee ePolicy Orchestrator console. We send signature updates and software updates to all of the agents that we are responsible for.
With this solution we use ENS with DLP. DLP works in controlling data protection when transferring data from PC to USB, USB to PC. We also use it for read-only access for hard disks. In DLP we have many options which we can work with. Currently, we are using it for the clipboard, where we cannot capture screenshots from the PC screen, as well as for USB locking/data transfer, and the hard disk protection.
I use McAfee as a solution to monitor our network log systems. I monitor logs and use it to be able to report incidents and get better internal vision.