How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.
We primarily use this solution for folder and disk encryption. One encrypted folder in Drive D: for each PC user and disk encryption for all notebook PCs, especially for sensitive or confidential data.
We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution. Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home. Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.
We primarily use the solution for endpoint protection, data loss prevention and application whitelisting.
This solution helps us to protect and secure our data.
I use this solution to protect my notebook. This is an on-premise deployment that was installed by my company on my notebook.
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.