We performed a comparison between ESET Endpoint Encryption and McAfee Complete Data Protection based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Encryption solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The setup is getting easier."
"It is very secure and we have finally decided to use this after a thorough check. The interface is easy to navigate."
"ESET Endpoint Encryption works as an antivirus system."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"The product is easy to implement and configure."
"The initial setup is easy."
"This solution can be centrally managed."
"The tool does not slow down the computer."
"It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution."
"With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction."
"In the configuration, you can restrict a user from accessing a removable drive."
"The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage."
"I am satisfied with the customer service/technical support."
"It is capable of acting as Web control, Device Control, or Data Control."
"With this solution, the device control is more reliable and more stable."
"We can scale the solution."
"If you have issues with your network, you can't get updates, which is a problem."
"There should be more frequent updates."
"Sometimes the server console is very slow, so the performance could be improved."
"The solution should have better synchronization with active directory users and passwords for use in the encryption."
"I would like to see better compatibility with mobile devices."
"ESET Endpoint Encryption needs to improve pricing and security."
"I would like more robust reporting as part of the Remote Administrator."
"The initial setup could be made easier."
"Initial setup was complex."
"The price could be improved."
"There are some features that do not work with Mac."
"The solution needs a next generation or AI firewall that doesn't rely on signatures to detect traits."
"It is difficult to manage."
"This solution does not do as well at protecting the end-user against unknown viruses."
"We are looking for more granular control over the policies."
"Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice."
More McAfee Complete Data Protection Pricing and Cost Advice →
ESET Endpoint Encryption is ranked 6th in Endpoint Encryption with 13 reviews while McAfee Complete Data Protection is ranked 5th in Endpoint Encryption with 31 reviews. ESET Endpoint Encryption is rated 8.4, while McAfee Complete Data Protection is rated 8.2. The top reviewer of ESET Endpoint Encryption writes "A reasonably priced solution that is an easy-to-use and effective at the same time". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". ESET Endpoint Encryption is most compared with Microsoft BitLocker, Sophos SafeGuard, Symantec Endpoint Encryption and WinMagic SecureDoc, whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint, Trend Micro Endpoint Encryption and Sophos SafeGuard. See our ESET Endpoint Encryption vs. McAfee Complete Data Protection report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.