"The interface is user-friendly and it provides a large number of options."
"I am satisfied with the customer service/technical support."
"The server software console is exquisitely designed and organized for handy access and manipulation by the administrator."
"The beauty of McAfee is that they are not looking at encryption from one single standpoint. It is a broader solution."
"With proper policies and configuration, it prevents sending corporate data to both cloud storage or to flash drives and data extraction."
"The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud."
"The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage."
"The most valuable feature is security."
"We have not seen any bugs or glitches, so the stability is good."
"BitLocker is completely stable."
"The most valuable feature is the simplicity and integration with the Microsoft Clouds platform."
"The ease of use is the most valuable feature. The ability to import data to build your frontend on top of the data is very simple and very useable."
"It's my understanding that the initial setup is straightforward."
"I liked the way it works with our Microsoft tools. As we roll out Intune, we can validate if the device has been encrypted, and if not, we can push it down. It is pretty simple to deploy."
"The solution works the way it's supposed to - stability and scalability are fine."
"It's a straightforward solution for encryption."
"The price is a little high and could be better."
"The solution needs more advanced features."
"The drive side encryption can be confusing to use and needs better documentation."
"I would like to have an easier and less-hassle upgrade process in future releases of the software, and extra license renewal price discounts too."
"There was an option for SQL setup in the older versions of this product and it has been removed, but we would like to see it made available as an add-on."
"We are looking for more granular control over the policies."
"There are some features that do not work with Mac."
"In terms of where the solution could improve, it could integrate with network solutions for ADTs, email web gateways and discovery."
"The people at the first level of support refer you to articles that do not pertain to the problem at hand."
"The solution should offer encryption for other items such as shared folders, removable media, etc."
"The visualization could be better."
"The console GUI could be better."
"The biggest one for us is revoking access. So, even though someone downloads something to a device, we want the ability to cloak that device or data and bring it back or make that data unusable for that person. Currently, BitLocker doesn't give us that ability. It basically encrypts it. We're seeing if identity management or IAM allows us to do that. We're kind of looking at third-party software that does that for us."
"I would like to be able to encrypt our cloud tenancy."
"User profiles can be improved so that people can create their own passwords. It has one password per machine, which is a problem. We would prefer each user to have his or her own boot password. Each user can have a username and password or biometrics, such as fingerprints and iris scanner, integrated into the boot process, but I really can't see that coming anytime soon, if ever."
"It's possible that the time it takes to pull items in to BitLocker could be reduced a bit."
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.
BitLocker is Microsoft's full disk encryption solution, which protects all of your data from theft, hacking or loss. BitLocker does this by encrypting the entire drive that hosts your Windows operating system and all your data.
BitLocker is available for all devices, including portable storage devices (such as external hard drives and USB flash drives). These portable devices are supported by a feature called BitLocker To Go, which is included in Windows 7 and 8, and in Windows Server 2008 R2 and Windows Server 2012. In Windows XP, encrypted devices can be read, but not written to, using the BitLocker To Go Reader program.
McAfee Complete Data Protection is ranked 4th in Endpoint Encryption with 9 reviews while Microsoft BitLocker is ranked 1st in Endpoint Encryption with 12 reviews. McAfee Complete Data Protection is rated 8.2, while Microsoft BitLocker is rated 7.2. The top reviewer of McAfee Complete Data Protection writes "An excellent solution for protecting from data exposure, device protection, and shadow IT". On the other hand, the top reviewer of Microsoft BitLocker writes "Brings us in compliance, works with our Microsoft tools, and is pretty simple to deploy". McAfee Complete Data Protection is most compared with Symantec Endpoint Encryption, Cisco Secure Endpoint, Sophos SafeGuard, Trend Micro Endpoint Encryption and McAfee Total Protection for Data Loss Prevention, whereas Microsoft BitLocker is most compared with ESET Endpoint Encryption, Symantec Endpoint Encryption, Sophos SafeGuard, Trend Micro Endpoint Encryption and Vormetric Data Security Platform. See our McAfee Complete Data Protection vs. Microsoft BitLocker report.
See our list of best Endpoint Encryption vendors.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.