Sanjit AcharySenior Manager at a tech services company
Arun SubramaniamCyber Security Engineer at quadra
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The central manager policy means we have almost all client modules in one solution."
"From a single dashboard, I can take a look at several things including the endpoint protection, the file integrity section, the data activity monitor, and more."
"The central management console is the solution's most valuable aspect."
"The graphical interface of the solution is its most valuable aspect."
"The security is a key feature and the console is very user friendly."
"Technical support is very helpful."
"The general endpoint protection is valuable, and it is easy to manage."
"The most valuable feature of this solution is endpoint security."
"The data matching features are the most valuable due to the easy policy setup and implementation."
"We find the product is easy to manage and maintain."
"We work in the banking field. We deploy data loss prevention. Our branch protects our clients' data, credit card numbers, account numbers, and other confidential and sensitive data."
"The dashboard, management section, and reporting are good."
"The dashboard, management section, and reporting are good."
"The tool's really working well, and the agents are good."
"There's only one policy needed to implement for all channels."
"The detection aspect should be improved so that signatures are updated more quickly."
"There is a problem when it comes to agent communication and duplicate records, where the rebooting of a machine leads to the installation of a new agent and you get a lot of duplicate records that ultimately affect your compliance monitoring."
"There needs to be support for Mac computers. Currently, McAfee does not work on iOS."
"The solution sometimes has some false positives on IP addresses, from the web control aspect of the product. This needs to be improved."
"Lacks a single plug-in for multiple uses."
"Sometimes agents hang. We have to reinstall the agents."
"There should be more insights and completeness into the cyber kill chain, similar to CrowdStrike and SentinelOne. It just seems a little outdated in being 100% signature-based without all of the insights and protections that come with CrowdStrike and SentinelOne. Overall, they've got some catching up to do if they plan to compete in the comprehensive EDR space."
"This product is very powerful but it is very complex, so making it simpler to use would be an improvement."
"The enforce service is difficult to understand, and free courses made available on the internet would be useful."
"We're not sure if there was an issue or a bug on the system recently because as of right now if someone sends out a compressed encrypted file, the DLP won't scan it."
"I would like for the administrator management interface to improve. It's kind of old and slow. Updating it would make this solution better."
"There are some features that are not available which are required by every data loss prevention solution."
"It is very difficult to log in to create a support ticket because no one is available to support our queries."
"Technical support is pathetic."
"The solution is not user-friendly."
"It is attractively priced. It is a fraction of what we're going to pay for CrowdStrike or SentinelOne, but it only has a fraction of the capabilities as well."
"Pricing is reasonable."
"The pricing is reasonable."
"The price is competitive."
"The price of the solution is expensive."
Keeping sensitive corporate information safe and compliant has never been easy. But today, you’re faced with a totally new set of data protection challenges. Sensitive information is leaving the safety of your corporate network as more employees share files over consumer cloud storage services and access those files on their own mobile devices. The number of targeted cyber attacks continues to grow, as cybercriminals develop effective new methods for defeating traditional security measures and stealing corporate information. And as all of these factors converge, it becomes increasingly difficult to manage corporate information and protect it against loss and theft.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces today’s cloud- and mobile-centered realities. With DLP, you can:
• Discover where data is stored across all of your cloud, mobile, network, endpoint, and storage systems
• Monitor how data is being used, whether your employees are on or off the network
• Protect data from being leaked or stolen—no matter where it’s stored or how it’s used
McAfee ePolicy Orchestrator is ranked 5th in Security Orchestration Automation and Response (SOAR) with 7 reviews while Symantec Data Loss Prevention is ranked 1st in Data Loss Prevention (DLP) with 14 reviews. McAfee ePolicy Orchestrator is rated 7.8, while Symantec Data Loss Prevention is rated 7.6. The top reviewer of McAfee ePolicy Orchestrator writes "Great graphical interface, good log events, and a simple setup". On the other hand, the top reviewer of Symantec Data Loss Prevention writes "Great Data Loss Prevention technology with impressive granularity and good stability". McAfee ePolicy Orchestrator is most compared with McAfee MVISION ePO, Forcepoint Data Loss Prevention, Trend Micro Integrated Data Loss Prevention, Digital Guardian and Splunk Phantom, whereas Symantec Data Loss Prevention is most compared with Forcepoint Data Loss Prevention, Microsoft Data Loss Prevention, Trend Micro Integrated Data Loss Prevention, Digital Guardian and GTB Technologies Inspector. See our McAfee ePolicy Orchestrator vs. Symantec Data Loss Prevention report.
We monitor all Security Orchestration Automation and Response (SOAR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.