McAfee Complete Data Protection Valuable Features

AA
IT Lead\Network Security Analyst at Oiltest Services Limited

The new feature for online protection does a good job of identifying traits. 

The solution prevents users from downloading or copying data to a USB. 

Bandwidth usage is reduced. 

View full review »
Victor Akidiva - PeerSpot reviewer
CEO at Semper Systemis Ltd

I like all the features provided by the solution.

View full review »
Massimo Biccini - PeerSpot reviewer
Cyber Security Consultant & Presale at Innovery

The adaptive threat protection and the new component of EDR are excellent.

It's a new technology. However, it’s already improving with new additions. It gives new releases more frequently than in the past with other McAfee products. It evolves quickly.

The console of the EDR is totally in the cloud.

We have all we need, and the customer is happy.

It's very configurable, McAfee. If we talk about McAfee, we have a lot of opportunities to configure the product, customize features, views, or reports, et cetera.

View full review »
Buyer's Guide
McAfee Complete Data Protection
April 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.
Alain Orlanes - PeerSpot reviewer
Manager at WSI

Actually, the feature I found valuable is almost everything in the solution except that it's not applicable to a Windows OS. Reporting and encryption are its most valuable features.

View full review »
Mohammed Badowi - PeerSpot reviewer
IT system manager at NBO

Our compliance department understands that we need a secure environment free from viruses.

View full review »
AA
Account manager

The most important feature of McAfee Complete Data Protection to my customers is the ePO or the management console. It's easy to use and it's scalable. You can also generate the reports you want on the console. It's a mature management console. The features that McAfee Complete Data Protection has, for example, anti-spam features and other features can also be found on other solutions, but the most unique feature you can find in the solution is the ePO itself, the management console.

View full review »
AA
Presales Manager at a computer software company with 501-1,000 employees

Often the customers have requirements where we need to provide them with endpoint DLP (Data Loss Prevention) solutions. McAfee's DLP is a very good product. It gives you accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss. This is what I think is the most valuable feature in the solution.  

View full review »
VK
VP - Cyber Security at a manufacturing company with 11-50 employees

I have found the USB part most valuable.

The disk encryption is great.

It is straightforward to set up.

The solution can scale well. 

View full review »
MD
Senior Vice President IT at AS IT Consulting Pvt. Ltd.

The product is completely data-based, and I have no words to say. It's truly amazing. It provides encryption, data protection, and DLP, all under one roof. Usually, many competitors don't offer such a consolidated and easily manageable solution. The deployment, scalability, and reporting is too good.

View full review »
AS
Network Engineer at IBoss Tech Solutions Pvt. Ltd

The solution has good monitoring and interface features for the DPM layer.

View full review »
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.

All of the Complete Data products are valuable. We haven't had any issues.

View full review »
SA
Senior Cyber Security Consultant at Ingram Micro Inc.

The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage. 

The solution is simple.

Accessing the DLP is easy.

View full review »
IA
Global IT Manager at a pharma/biotech company with 501-1,000 employees

With this product, the performance of the database wasn't affected at all.

In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.

I came to this solution because there was a data leak from one of the internal users who was taking information from inside the company, from the ERP system. When she left the company, she was giving it to our competitors. I found a way with this product to also create a DLP solution. I got two products in one solution, so it is very efficient.

View full review »
NS
Cyber Security Engineer at a security firm with 11-50 employees

The data protection has been very good. Customers like the product based on the amount of protection they are getting.

We can scale the solution.

It's a stable product.

View full review »
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.

Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device. 

View full review »
Subbu Madhira - PeerSpot reviewer
CEO at OmniNet Systems

They offer very good accepted standards. The solution is compliant and offers good support. They offer pretty good security due to their standards compliance. 

It is part of the DLP and works well for that use case.

View full review »
AA
IT Lead\Network Security Analyst at Oiltest Services Limited

The most valuable feature of this solution is Data Loss Prevention. There is progression. It's quite amazing!

In the configuration, you can restrict a user from accessing a removable drive. They can bring in malware from external sources into the network without it coming from the internet. It could come from a memory stick. With the Data Loss Prevention, we can check for this and we can stop them from being able to use a flash drive or pin drive on their computer.

You can stop them from having access to a CD so that the company information cannot be lost to malware. They can't access anything, because as soon as they insert a memory stick it tells them to stop.

The company is also trying to prevent any data, or files from being copied. With this feature, you can configure it to not allow any copying.

If anyone inserts a memory stick, we get a report alerting us on the server of where the threat is coming from or who is trying to bypass or change the rule.

Another valuable feature is the McAfee ePO, which is the centralized monitoring tool. You can have your computers on the network and this feature will tell you who is behind in terms of updates from the server. You can also view the modules that have been installed on a particular workstation.

View full review »
JC
IT Security Consultant at ZOL Zimbabwe

The McAfee Threat Protection and McAfee Web Protection are valuable aspects of the solution. They're better than other features that come with the endpoints.

View full review »
RT
Lead Cyber Security Consultant at a security firm with 501-1,000 employees

The most valuable feature is the unified management console, ePO. The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud.

View full review »
OA
Security Consultant at CS Africa

I am not really an end-user so my answer is addressed talking more from the integration side. I do a lot of integration, and from this point of view, using McAfee as a data protection solution and for data classification is most valuable. I think McAfee actually fits very well with providing literally all the use cases for you. If end-users cannot classify data and solve the problem of data classification, then they can not successfully move forward and get on to data discovery using something like the McAfee Discover running it from the endpoint or running it from the network and doing network DLP (Data Loss Prevention/Data Loss Protection). We are sometimes having to look at it more from a perspective of the cost rather than actually solving the problem. It will work out so long as it helps end-users to classify their data. Some clients have some budget restrictions.  

So, for some use cases, I think it will be good for a certain type of user. It would be best for those who need data enforcement from both endpoints and from the network. I think it is perfect for shadow IT as well. With the proper policies in place, it could prevent you from sending corporate data to both cloud storage or to flash drives. If you look at it as a device control feature, it limits what you can send to removable storage devices. Configured a different way, you can send your other unclassified data to cloud storage and the like.  

Looking at it from a general use case as a security consultant, what most organizations try to prevent is data extrication. If you can prevent people from moving corporate data to their private clouds or to their own personal storage devices, you would have saved yourself a lot of stress. If the employee exits their security system carelessly, someone can actually extricate data during that process breach.  

Another use case is preventing loss of confidentiality. If you are trying to ensure the confidentiality of your data, using McAfee DLP you can prevent certain classification levels of data from being sent to printers or sent through emails.  

There is file and folder encryption and there is also complete McAfee Drive Encryption. The beauty of McAfee is that they are not looking at encryption from one single standpoint. It is a broader solution.  

If I have FileVault on my Mac Pro, I can protect my Mac. McAfee has encryption that helps you manage encryption natively. If you have BitLocker and you prefer to use it on your products, you can and you can still have a central management console for both your endpoint and your other encryption with McAfee. I think that is actually a perfect example of how you can use MNE (Management of Native Encryption) to manage your native encryption along with other products.  

View full review »
AK
Project Engineer at ISSP

All features in this solution are valuable, but it depends on its function.

It is capable of acting as Web control, Device Control, or Data Control.

View full review »
JA
Senior Technical Team Lead at Foresight Software Solutions Pvt Ltd

With respect to data loss prevention, I think it is helpful to the customer; except for a few limitations with Mac. 

View full review »
AB
Service Security Specialist

The antivirus is the solution's most valuable feature.

The interface is very good. You can create and manage your own dashboard.

The reporting is very good.

View full review »
KK
Storage Engineer at 22by7

The most valuable features are data loss prevention and encryption.

The interface is user-friendly and it provides a large number of options.

The support services from McAfee are freely available at any point in time.

Of of the features that I like the best is document tagging, where the user can specify attributes such as confidential.

The encryption group feature will ensure that the system is compatible. If everything is fine then encryption will begin. However, if there is an incompatibility then the encryption will be halted.

View full review »
KK
Storage Engineer at 22by7

The classification front-end and the features for the endpoint are great aspects of the product. 

It works absolutely fine for the customer requirements.

It's user-friendly and easy to navigate.

The initial setup is very easy.

Technical support is very helpful. 

The stability is good. 

The product can scale. 

View full review »
DC
Application Programmer (Infrastructure and OA support) at a government with 11-50 employees

The most valuable features are effective folder and disk encryption, and the practical server console-started agent/encryption module deployment to endpoints are highly commendable.

The server software console is exquisitely designed and organized for handy access and manipulation by the administrator.

Encryption user assignment and key generation can be performed fast enough.

View full review »
YR
Manager IT at OTE

With this solution, the device control is more reliable and more stable. We even use it for our email policies, but we are mainly using it in our environment for device protection policies. We are controlling almost all types of devices, like USB and CD-ROM devices, imaging devices, and even cameras. So we are basically able to control everything in our environment.

View full review »
TD
Senior Trusted Advisor LoB Banking at a tech services company with 10,001+ employees

I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job.

View full review »
VM
Product Manager at Axoft Ukraine

The most valuable feature is security.

View full review »
AK
Technical Security Engineer at Hitachi Systems, Ltd.

Some of the features that have been most valuable include the firewall protection, wave control, and data loss protection.

View full review »
Buyer's Guide
McAfee Complete Data Protection
April 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.