McAfee Complete Data Protection Competitors and Alternatives

The top McAfee Complete Data Protection competitors are
Read reviews of McAfee Complete Data Protection competitors and alternatives
Real User
Website and EComm at a retailer with 1,001-5,000 employees
Mar 13 2017

What do you think of Microsoft BitLocker?

Understanding your responsibilities for disaster recovery at a departmental level can be difficult; IT departments are holistic entities. We deal with systems, people, security, servers and infrastructure... but we also need to think about things at a granular level so we can ready ourselves for when a terrible system failure occurs - it always will. My problem was that we needed to ensure we had a very basic form of disaster recovery for our staff who were planning an event that gave us the biggest turnover of our year. Okay, so, our staff needed to take business critical information out of the office on something they could access individually. Yes, we could have used cloud storage but the staff needed full portability and access with or without the internet. Not to make...
Consultant
Solution Sales Specialist at a tech services company with 5,001-10,000 employees
Feb 25 2018

What is most valuable?

Real-time threat prevention using sandboxing, file trajectory, and retrospective security. On the prevention side, AMP has nine engines. New feature AMP Visibility (beta) is an IR orchestration tool, where the local AMP for Endpoint... more»

How has it helped my organization?

Provides enhanced security, lowering IT risks, and IT operational costs by integrating with Cisco NGFW, network security and email security.

What needs improvement?

It does not include: * Encryption * Decryption of local file shares * Disks and URL filtering are done by separate product.
Real User
Operator at Halliburton
Jul 10 2017

What is most valuable?

* The software offers a three-click policy setup * There is no key management servers to install * The compliance and reporting features are simple * The option for self-service key recovery for the user or administrator is simplistic.

How has it helped my organization?

As part of security consulting, different projects and clients require different levels of security. For the last few years, I used Sophos high security routers. I have come to find the full disk encryption and enterprise management options... more»

What needs improvement?

I do not see very many downfalls, but I would recommend adding a few different encryption algorithms. For example, adding Triple DES, Blowfish, and Twofish, would only provide added value to the users. They could then decide how to secure the... more»

Sign Up with Email