Compare McAfee Complete Data Protection vs. Stormshield Data Security

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Stormshield Data Security? Share your opinion.
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: December 2020.
455,164 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"The price of this solution needs to be improved.""The price is good, it's a low-cost solution.""This solution is reasonably priced.""The pricing is better than that of some competing products.""The pricing of the cloud offering seems confusing."

More McAfee Complete Data Protection Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
455,164 professionals have used our research since 2012.
Questions from the Community
Top Answer: The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.
Top Answer: The solution needs more advanced features. Customers tend to not like the navigation that is offered. While accessing the DLP is easy, navigating inside of it is difficult. The policies and… more »
Ask a question

Earn 20 points

Ranking
4th
out of 26 in Endpoint Encryption
Views
4,937
Comparisons
4,130
Reviews
9
Average Words per Review
652
Rating
7.8
21st
out of 26 in Endpoint Encryption
Views
135
Comparisons
81
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Learn
McAfee
Stormshield
Overview

Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

Stormshield Data Security is based on end-to-end data encryption, from user to recipient, so as to provide transparent protection against man-in-the-middle attacks, malicious administration, and data leaks.

Offer
Learn more about McAfee Complete Data Protection
Learn more about Stormshield Data Security
Sample Customers
Xcel EnergySFR, MorphoTrust USA, Visiativ, SPIE ICS, DCNS, RATP
Top Industries
VISITORS READING REVIEWS
Computer Software Company32%
Comms Service Provider17%
Government11%
Insurance Company5%
No Data Available
Company Size
REVIEWERS
Small Business58%
Midsize Enterprise17%
Large Enterprise25%
No Data Available
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: December 2020.
455,164 professionals have used our research since 2012.

McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 11 reviews while Stormshield Data Security is ranked 21st in Endpoint Encryption. McAfee Complete Data Protection is rated 7.8, while Stormshield Data Security is rated 0.0. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, McAfee Complete Data Protection is most compared with Microsoft BitLocker, Cisco AMP for Endpoints, Symantec Endpoint Encryption, Sophos SafeGuard and Trend Micro Endpoint Encryption, whereas Stormshield Data Security is most compared with Microsoft BitLocker.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.