McAfee Complete Data Protection vs Oracle Advanced Security comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between McAfee Complete Data Protection and Oracle Advanced Security based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
768,578 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.""I have found the USB part most valuable.""It is part of the DLP and works well for that use case.""With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction.""The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints.""In the configuration, you can restrict a user from accessing a removable drive.""The beauty of McAfee is that they are not looking at encryption from one single standpoint. It is a broader solution.""With this solution, the device control is more reliable and more stable."

More McAfee Complete Data Protection Pros →

"The features that are the most used by the customers and partners are, at the moment, for GDPR, so obviously data encryption and data reduction. Our customers also like the partitioning option.""The most valuable feature is the data encryption option for columns and tables."

More Oracle Advanced Security Pros →

Cons
"There's a limited coverage of operating systems. The marketing strategies need to change drastically.""I want simplicity. A new user opening the dashboard will be confused. It needs to be more user-friendly.""I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too.""Initial setup was complex.""They need to segregate McAfee Complete Data Protection for endpoints and servers.""The solution should be more user-friendly.""We encountered several problems with the solution's stability.""The product must improve endpoint encryption."

More McAfee Complete Data Protection Cons →

"It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.""Having a single command to encrypt a table would be an improvement."

More Oracle Advanced Security Cons →

Pricing and Cost Advice
  • "The price of this solution needs to be improved."
  • "The price is good, it's a low-cost solution."
  • "This solution is reasonably priced."
  • "The pricing is better than that of some competing products."
  • "The pricing of the cloud offering seems confusing."
  • "I think the price could be a little bit less."
  • "McAfee Complete Data Protection is a little bit expensive."
  • "We currently have a contract option with McAfee Complete Data Protection."
  • More McAfee Complete Data Protection Pricing and Cost Advice →

    Information Not Available
    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection… more »
    Top Answer:It provides encryption, data protection, and DLP, all under one roof The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The… more »
    Top Answer:When it comes to pricing, I've observed an increase recently.
    Ask a question

    Earn 20 points

    Ranking
    2nd
    out of 28 in Endpoint Encryption
    Views
    2,954
    Comparisons
    2,183
    Reviews
    10
    Average Words per Review
    518
    Rating
    8.0
    12th
    out of 28 in Endpoint Encryption
    Views
    530
    Comparisons
    389
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Learn More
    Overview

    Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

    Oracle Advanced Security provides data encryption and strong authentication services to the Oracle database, safeguarding sensitive data against unauthorized access from the network and the operating system. It also protects against theft, loss, and improper decommissioning of storage media and database backups.

    Sample Customers
    Xcel Energy
    IBVI, illycaffe, Scottish water, trueblue, AirAsia
    Top Industries
    REVIEWERS
    Computer Software Company21%
    Energy/Utilities Company14%
    Government14%
    Security Firm14%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company13%
    Government13%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Financial Services Firm22%
    Government10%
    Computer Software Company10%
    Healthcare Company9%
    Company Size
    REVIEWERS
    Small Business53%
    Midsize Enterprise20%
    Large Enterprise27%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise15%
    Large Enterprise68%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise13%
    Large Enterprise72%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption. Updated: April 2024.
    768,578 professionals have used our research since 2012.

    McAfee Complete Data Protection is ranked 2nd in Endpoint Encryption with 30 reviews while Oracle Advanced Security is ranked 12th in Endpoint Encryption. McAfee Complete Data Protection is rated 8.0, while Oracle Advanced Security is rated 8.0. The top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". On the other hand, the top reviewer of Oracle Advanced Security writes "Good support, stable, and offers encryption at both the column and table level". McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint, Check Point Full Disk Encryption Software Blade and Trend Micro Endpoint Encryption, whereas Oracle Advanced Security is most compared with IBM Security Guardium Data Protection, Microsoft BitLocker, Voltage SecureData Enterprise, Protegrity Data Security and Oracle Data Masking and Subsetting.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.