2018-04-12T05:41:00Z

What is your primary use case for McAfee Complete Data Protection?

Julia Miller - PeerSpot reviewer
  • 0
  • 3
PeerSpot user
24

24 Answers

MD
Reseller
Top 5
2023-12-15T05:31:00Z
Dec 15, 2023

We use McAfee Complete Data Protection to ensure compliance with regulations such as HIPAA, PCI, PII, and GDPR, ensuring that personal or confidential data remains within the organization.

Search for a product comparison
Victor Akidiva - PeerSpot reviewer
Real User
Top 5
2023-08-25T11:05:42Z
Aug 25, 2023

We use the product for antivirus protection for all devices. We also use it for server protection for both Windows and Linux. We use endpoint encryption for laptops, too. Web protection is embedded in the browser.

AS
Real User
Top 20
2023-07-10T08:45:00Z
Jul 10, 2023

We use the solution to manage all incoming and outgoing traffic of the user's laptop.

Alain Orlanes - PeerSpot reviewer
Reseller
Top 10
2023-06-20T08:12:47Z
Jun 20, 2023

Actually, my customers use the solution for important documents. So, they usually use the DLP on-prem. They have an on-prem solution for DLP.

Sunil  Kumar - PeerSpot reviewer
Real User
Top 5
2023-01-18T05:30:18Z
Jan 18, 2023

We use this solution for outfitting our customers. We have a hybrid deployment. We have many Complete Data products in versions 11.6 and 11.7.

NS
Real User
Top 5
2022-11-28T10:09:53Z
Nov 28, 2022

We primarily use the solution to protect sensitive data and general protection.

Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Sunil  Kumar - PeerSpot reviewer
Real User
Top 5
2022-08-22T17:51:56Z
Aug 22, 2022

We have many clients in India using Complete Data Protection and host data protection. Complete Data Protection covers the network servers and endpoints. Okay. So with any species attachment scan with complete data production. Complete Data Protection was necessary to meet advanced customer requirements. We have around 2,250 users covered by Complete Data Protection.

Meleria Mangaring - PeerSpot reviewer
Real User
Top 5
2022-08-05T00:23:21Z
Aug 5, 2022

One of the best solutions for data loss protection.

Meleria Mangaring - PeerSpot reviewer
Real User
Top 5
Aug 5, 2022

@Evgeny Belenky DLP, device control, FRP and drive encryption.

PeerSpot user
Massimo Biccini - PeerSpot reviewer
Consultant
Top 10
2022-07-07T12:20:14Z
Jul 7, 2022

I have a project with McAfee and a customer to deploy and roll out the solution for ADR and other components from the McAfee ecosystem. The entire solution is for endpoint security with the new component, ADR, the adaptive threat protection, and the TIE server, which is responsible for the threat information exchange between the product of the ecosystem. There’s a sandbox connected to the endpoint protection, to the ePolicy Orchestrator, and also the network security platform to connect the sensor for EPS or EDS. We have several components on top of the McAfee agent. Each component performs different activities. We have the base component that is the classic anti-malware, and then the endpoint security, which we call the endpoint security platform. We also have adaptive threat protection that can handle the reputation on file. If the file is unknown and the GTI (global threat intelligence) of McAfee doesn't know the reputation of a file, this file can be sent to the sandbox. Then, the sandbox analyzes the file to discover if it's zero-day ransomware or something else. They can then decide if the file needs to be blocked or if some other action needs to be taken. There’s the new component ADR on top of the solution from McAfee Complete Protection that can collect the index of items compromised inside the computer. All this information is sent to the cloud, to the console ADR in the cloud. We can analyze everything with the security operation center.

Subbu Madhira - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-04-11T13:40:22Z
Apr 11, 2022

It can be used for all mobile works laptops, which are more susceptible to data loss. Or it can be used for file servers where you put your file servers on the cloud, and so the data addresses and transit are encrypted.

KK
Real User
2021-07-30T23:31:39Z
Jul 30, 2021

We primarily provide services to our clients. Clients usually use the solution mainly to audit GDPR compliance. As for the audit, they need to meet their compliance, the PCI DSS compliance, and GDPR compliance. Based on that they procure the DLP solution.

JA
Reseller
2021-03-12T09:11:20Z
Mar 12, 2021

We have huge clients, like Toshiba, Bangalore International Airport, Viacom, and other companies.

VM
Real User
Top 20
2021-02-23T19:08:10Z
Feb 23, 2021

We use it, for example, for USB devices. When we are using USB devices, we have to put the password to open the USB stick. Without it, we cannot use the USB stick anywhere.

RT
Consultant
2021-02-19T13:11:13Z
Feb 19, 2021

We are a solution provider and this is one of the security products that we implement for our clients. I focus primarily on data protection and data loss prevention solutions, and in this role, I work with McAfee Complete Data Protection a lot. We also use it for encryption. A simple use case would be keywords and reject detection. Other reasons that we use it are for PII and PCI compliance.

AK
Real User
2021-01-23T11:46:00Z
Jan 23, 2021

The main use case of this solution is identifying bad actors (criminals) who want to steal data and locking them out of areas that require authentication.

KK
Real User
2020-09-06T08:04:26Z
Sep 6, 2020

We are system integrators who do the implementation and provide support for a variety of products. One of our main areas of focus is endpoint security, along with data loss prevention, encryption, and web security. McAfee Complete Data Protection is one of the security solutions that we implement for our customers. It is the best match for GDPR compliance.

OA
Reseller
2020-09-01T05:25:09Z
Sep 1, 2020

I am actually very familiar with the on-premises solution. I am just starting to try out the cloud version. I have not really had the opportunity to exercise the capabilities fully because I need to buy the license to do that. I work with Cyber Security Africa Distribution, but even being that type of organization we still have to purchase our license to try the full solution. I have seen it work with the MVISION Cloud, but I have not tried out the data protection path. But I have reviewed all the features.

SA
Real User
2020-03-16T06:56:17Z
Mar 16, 2020

Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.

DC
Real User
2020-03-10T08:19:00Z
Mar 10, 2020

We primarily use this solution for folder and disk encryption. One encrypted folder in Drive D: for each PC user and disk encryption for all notebook PCs, especially for sensitive or confidential data.

AA
Real User
2019-12-23T07:05:00Z
Dec 23, 2019

We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution. Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home. Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.

AB
Real User
2019-11-17T06:50:00Z
Nov 17, 2019

We primarily use the solution for endpoint protection, data loss prevention and application whitelisting.

AA
Real User
2019-11-04T06:14:00Z
Nov 4, 2019

This solution helps us to protect and secure our data.

TD
Real User
2019-09-25T05:10:00Z
Sep 25, 2019

I use this solution to protect my notebook. This is an on-premise deployment that was installed by my company on my notebook.

IA
Real User
2018-04-12T05:41:00Z
Apr 12, 2018

The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.

Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices...
Download McAfee Complete Data Protection ReportRead more

Related articles