Compare McAfee Complete Data Protection vs. ZENworks

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use ZENworks? Share your opinion.
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: December 2020.
455,962 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
"The price of this solution needs to be improved.""The price is good, it's a low-cost solution.""This solution is reasonably priced.""The pricing is better than that of some competing products.""The pricing of the cloud offering seems confusing."

More McAfee Complete Data Protection Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
455,962 professionals have used our research since 2012.
Questions from the Community
Top Answer: The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage.
Top Answer: The solution needs more advanced features. Customers tend to not like the navigation that is offered. While accessing the DLP is easy, navigating inside of it is difficult. The policies and… more »
Ask a question

Earn 20 points

Ranking
4th
out of 26 in Endpoint Encryption
Views
4,937
Comparisons
4,130
Reviews
9
Average Words per Review
652
Rating
7.8
18th
out of 26 in Endpoint Encryption
Views
386
Comparisons
251
Reviews
0
Average Words per Review
0
Rating
N/A
Popular Comparisons
Compared 83% of the time.
Learn
McAfee
Micro Focus
Overview

Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

ZENworks Full Disk Encryption (formerly Novell ZENworks Full Disk Encryption) reduces the cost of deploying, managing, and troubleshooting encrypted laptops and desktops. It has automated data protection that locks out threats. It manages encrypted devices remotely and cut travel costs. Avoids security breaches and stay out of the news and gives IT staff a familiar management environment.
Offer
Learn more about McAfee Complete Data Protection
Learn more about ZENworks
Sample Customers
Xcel EnergyCSC
Top Industries
VISITORS READING REVIEWS
Computer Software Company31%
Comms Service Provider17%
Government11%
Financial Services Firm6%
No Data Available
Company Size
REVIEWERS
Small Business58%
Midsize Enterprise17%
Large Enterprise25%
No Data Available
Find out what your peers are saying about Microsoft, Broadcom, Sophos and others in Endpoint Encryption. Updated: December 2020.
455,962 professionals have used our research since 2012.

McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 11 reviews while ZENworks is ranked 18th in Endpoint Encryption. McAfee Complete Data Protection is rated 7.8, while ZENworks is rated 0.0. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco AMP for Endpoints, Sophos SafeGuard and Trend Micro Endpoint Encryption, whereas ZENworks is most compared with Microsoft BitLocker and Symantec Endpoint Encryption.

See our list of best Endpoint Encryption vendors.

We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.