Dell Encryption Enterprise [EOL] vs McAfee Complete Data Protection comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Dell Encryption Enterprise [EOL] and McAfee Complete Data Protection based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption.
To learn more, read our detailed Endpoint Encryption Report (Updated: April 2024).
768,740 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"One place where I can give them top level is the tiered administration, whereby you can assign roles to the support team to say, "You would be responsible for changing passwords. You would be responsible for system management and configurations, and you are the major admin of this." They have that on lockdown. The active directory integration is also pretty okay. It is not so bad. It does have normal features that most of the encryption tools have, such as full-disk encryption, volume encryption, and external drive encryption. I am not sure if they do file-level encryption and if DLP is integrated with the encryption product. I would like to assume that these features are there.""The technical support provided by Dell EMC comes with proactive technical support.""We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server."

More Dell Encryption Enterprise [EOL] Pros →

"It works seamlessly as long as it's well configured and the policies have been put properly.""I am satisfied with the customer service/technical support.""With respect to data loss prevention, I think it is helpful to the customer.""It is capable of acting as Web control, Device Control, or Data Control.""The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud.""The interface is user-friendly and it provides a large number of options.""Technical support is very helpful.""The solution has a good interface."

More McAfee Complete Data Protection Pros →

Cons
"It is not working properly for us because of which we had to decrypt all our encryptions. I have not used it much, and based on what I have heard, it is very tough to manage. Managing this system is not as easy as it should be. The central management is awful, and the encryption process is tedious. There are too many issues with even recovering passwords. Its ease of deployment is awful. Their support needs to be improved. It is just my fifth week working with this organization, and since I got here, it has been about, "Oh! We have these issues with Dell, and it is not working properly. It is so hard to work with, and please get on with the support team so we can get this resolved as soon as possible." To get the support on the phone is usually a big problem, and by the time they call you back and tell you it is going to take, for instance, about an hour, we end up spending like four hours, and we don't get anything done. The firm has finally decided that Dell is not going to be the way to go. We are now exploring other encryption products. In terms of new features, it should have cloud tenancy encryption. Everything is moving to the cloud, and it would be cool if the next version of Dell encryption can offer that. Based on my research, it seems that a few solutions can do that right now, particularly the McAfee Complete Protection suites. It would be good if Dell can also move away from on-prem. The solution that we're working with is an on-prem solution. I don't know if it is available in the cloud, but it would be good if they can make it available in the cloud. This probably would also help with the cloud tenancy encryption. Another feature that I would've loved them to have is for the passphrase self-recovery for a user. Such a feature would reduce some bit of burden on the help desk team. Currently, people forget their passphrase every single week, and they have to get to the help desk to reset their password. It would have been pretty cool if a passphrase self-recovery option was available for a user.""As soon as we introduce any new tools or applications, we have to work with the back-end team to handle new problems that are created. Once they're figured out, the solution will stabilize, but the problems keep coming up whenever we introduce a new tool or application. It has been a challenge.""Some customers have less security in the solution regarding their data."

More Dell Encryption Enterprise [EOL] Cons →

"It is difficult to manage.""We are looking for more granular control over the policies.""As a new technology, it does need to grow.""I want simplicity. A new user opening the dashboard will be confused. It needs to be more user-friendly.""I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too.""The solution's pricing could be better.""The solution should be more user-friendly.""The price is a little high and could be better."

More McAfee Complete Data Protection Cons →

Pricing and Cost Advice
Information Not Available
  • "The price of this solution needs to be improved."
  • "The price is good, it's a low-cost solution."
  • "This solution is reasonably priced."
  • "The pricing is better than that of some competing products."
  • "The pricing of the cloud offering seems confusing."
  • "I think the price could be a little bit less."
  • "McAfee Complete Data Protection is a little bit expensive."
  • "We currently have a contract option with McAfee Complete Data Protection."
  • More McAfee Complete Data Protection Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Endpoint Encryption solutions are best for your needs.
    768,740 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:We like the auto-decryption features. For example, a file is auto-decrypted when it is moved to a different location, either over the network, through email, or through upload to a web server.
    Top Answer:I see a lot of room for improvement in a couple of areas. One is that the decryption process is a bit complex and takes a lot of time, depending on how many files you have. If that can be improved, it… more »
    Top Answer:My company uses this solution for end-to-end encryption.
    Top Answer:Microsoft BitLocker is very intuitive and easy to maintain. It is basically the global standard solution for drive encryption and successfully fulfills regulatory needs in terms of data protection… more »
    Top Answer:It provides encryption, data protection, and DLP, all under one roof The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The… more »
    Top Answer:When it comes to pricing, I've observed an increase recently.
    Ranking
    Unranked
    In Endpoint Encryption
    2nd
    out of 28 in Endpoint Encryption
    Views
    2,954
    Comparisons
    2,183
    Reviews
    10
    Average Words per Review
    518
    Rating
    8.0
    Comparisons
    Learn More
    Overview
    Information Not Available

    Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.

    Sample Customers
    Information Not Available
    Xcel Energy
    Top Industries
    No Data Available
    REVIEWERS
    Computer Software Company21%
    Energy/Utilities Company14%
    Government14%
    Security Firm14%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company13%
    Government13%
    Manufacturing Company7%
    Company Size
    No Data Available
    REVIEWERS
    Small Business53%
    Midsize Enterprise20%
    Large Enterprise27%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise15%
    Large Enterprise68%
    Buyer's Guide
    Endpoint Encryption
    April 2024
    Find out what your peers are saying about Microsoft, McAfee, Sophos and others in Endpoint Encryption. Updated: April 2024.
    768,740 professionals have used our research since 2012.

    Dell Encryption Enterprise [EOL] doesn't meet the minimum requirements to be ranked in Endpoint Encryption with 3 reviews while McAfee Complete Data Protection is ranked 2nd in Endpoint Encryption with 30 reviews. Dell Encryption Enterprise [EOL] is rated 7.4, while McAfee Complete Data Protection is rated 8.0. The top reviewer of Dell Encryption Enterprise [EOL] writes "Helpful auto-decryption features and great tech support, but problems with adding new applications and a time-consuming decryption process". On the other hand, the top reviewer of McAfee Complete Data Protection writes "Bandwidth is reduced and online protection does a good job of identifying traits". Dell Encryption Enterprise [EOL] is most compared with , whereas McAfee Complete Data Protection is most compared with Microsoft BitLocker, Symantec Endpoint Encryption, Cisco Secure Endpoint, Check Point Full Disk Encryption Software Blade and Trend Micro Endpoint Encryption.

    See our list of best Endpoint Encryption vendors.

    We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.