McAfee ePolicy Orchestrator Competitors and Alternatives

Get our free report covering McAfee, Forcepoint, Broadcom, and other competitors of McAfee ePolicy Orchestrator. Updated: December 2020.
455,108 professionals have used our research since 2012.

Read reviews of McAfee ePolicy Orchestrator competitors and alternatives

Head9899
‚ÄéHead: Group Legal at Optiflex
Real User
Top 20
Aug 28, 2019
Enables us to see people who are accessing or try to access information they are not supposed to be accessing based on their level of classification

What is our primary use case?

We primarily use the solution for the endpoint machines within the environment.

Pros and Cons

  • "I'm able to track everyone who is trying to send information outside the environment and to know if they are not supposed to be sending it. I'm also able to see the people who are accessing or maybe try to access the information they are not supposed to be accessing based on their level of classification. It gives me overall control of who has got access to what and at what point. And who can do what with specific information."
  • "In a majority of cases, most of the companies are using DLP for endpoint sessions, where you have a user that might be communicating information outside of the company. However, they forget there are actual interfaces that can directly communicate with either the database or other files within the data center that uses end-to-end encryption. In those cases, you might need things like your DLP to be able to monitor and block some of that. The solution needs to catch information communicated through the data center on the server-side."

What other advice do I have?

We are using the on-premises deployment model. I would advise others that the solution does need careful planning before attempting an implementation. I would rate the solution nine out of ten.
Get our free report covering McAfee, Forcepoint, Broadcom, and other competitors of McAfee ePolicy Orchestrator. Updated: December 2020.
455,108 professionals have used our research since 2012.