Most Helpful Review | |||
| Use Stormshield Data Security? Share your opinion. | ||
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: December 2020. 455,164 professionals have used our research since 2012. |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice | |
"The price of this solution needs to be improved." "The price is good, it's a low-cost solution." "This solution is reasonably priced." "The pricing is better than that of some competing products." "The pricing of the cloud offering seems confusing." More McAfee Complete Data Protection Pricing and Cost Advice » | Information Not Available |
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs. 455,164 professionals have used our research since 2012. | |
Questions from the Community | |
Top Answer: The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage. Top Answer: This solution is reasonably priced. Top Answer: The solution needs more advanced features. Customers tend to not like the navigation that is offered. While accessing the DLP is easy, navigating inside of it is difficult. The policies and… more » | Ask a question Earn 20 points |
Ranking | |
Views 4,937 Comparisons 4,130 Reviews 9 Average Words per Review 652 Rating 7.8 | Views 135 Comparisons 81 Reviews 0 Average Words per Review 0 Rating N/A |
Popular Comparisons | |
![]() Compared 62% of the time. ![]() Compared 17% of the time. ![]() Compared 16% of the time. ![]() Compared 2% of the time. ![]() Compared 2% of the time. | ![]() Compared 100% of the time. |
Learn | |
McAfee | Stormshield |
Overview | |
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more. | Stormshield Data Security is based on end-to-end data encryption, from user to recipient, so as to provide transparent protection against man-in-the-middle attacks, malicious administration, and data leaks. |
Offer | |
Learn more about McAfee Complete Data Protection | Learn more about Stormshield Data Security |
Sample Customers | |
Xcel Energy | SFR, MorphoTrust USA, Visiativ, SPIE ICS, DCNS, RATP |
Top Industries | |
Computer Software Company32% Comms Service Provider17% Government11% Insurance Company5% | No Data Available |
Company Size | |
Small Business58% Midsize Enterprise17% Large Enterprise25% | No Data Available |
McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 11 reviews while Stormshield Data Security is ranked 21st in Endpoint Encryption. McAfee Complete Data Protection is rated 7.8, while Stormshield Data Security is rated 0.0. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, McAfee Complete Data Protection is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, Symantec Endpoint Encryption, Sophos SafeGuard and Trend Micro Endpoint Encryption, whereas Stormshield Data Security is most compared with Microsoft BitLocker.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.