Senior Vice President IT at AS IT Consulting Pvt. Ltd.
Reseller
Top 5
Excellent solution for data protection with robust features integrated seamlessly
Pros and Cons
  • "It provides encryption, data protection, and DLP, all under one roof. The deployment, scalability, and reporting is too good. My clients are satisfied with the stability of the product. The solution is highly scalable. The technical support's response time and turnaround time as the solution provider are excellent. The availability of great back-end support and process support makes the product great. The initial setup is straightforward, with simple configurations. I recommend the solution."
  • "There's a limited coverage of operating systems. The marketing strategies need to change drastically."

What is our primary use case?

We use McAfee Complete Data Protection to ensure compliance with regulations such as HIPAA, PCI, PII, and GDPR, ensuring that personal or confidential data remains within the organization.

What is most valuable?

The product is completely data-based, and I have no words to say. It's truly amazing. It provides encryption, data protection, and DLP, all under one roof. Usually, many competitors don't offer such a consolidated and easily manageable solution. The deployment, scalability, and reporting is too good.

What needs improvement?

There are some areas that need improvement. Firstly, the limited coverage of operating systems is a concern, as McAfee Complete Data Protection currently supports only Windows, leaving out Mac and Linux users. Network DLP integration may not be an advantage then. Furthermore, no US security solution is included in the complete data protection. It is available on the CASB front.

Additionally, the availability of presentations and sample reports is lacking, making it challenging for presentations and road shows. The absence of roadshows in India from the solution's end is affecting the introduction of new technologies to Chief Administrative Officers (CAOs). The marketing strategies need to change drastically. I had a deal for seven thousand users, and there's a competitor ready to step in. Being a more aggressive partner could help secure deals and upsell other McAfee products to customers.

For how long have I used the solution?

We have been using this solution since the time of its inception. Presently, we are working with its latest version, which is 11.6.

Buyer's Guide
McAfee Complete Data Protection
April 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.

What do I think about the stability of the solution?

My clients are satisfied with the stability of the product. I rate it a perfect ten.

What do I think about the scalability of the solution?

The solution is highly scalable. We exclusively cater to enterprise-level companies. Our client base ranges from a minimum of 6000 endpoints to a maximum of around 1,25,000 endpoints. I rate the scalability a nine out of ten.

How are customer service and support?

The technical support's response time and turnaround time as the solution provider are excellent. They go the extra mile to help us out by assisting us with log analysis and various aspects. Unlike other vendors who might refuse to help, the support here is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Forcepoint is a competitor. However, McAfee Complete Data Protection stands out mainly due to its exceptional backend support. The availability of great back-end and process support makes the product great.

How was the initial setup?

The initial setup is straightforward, with simple configurations and the availability of a comprehensive dictionary that is used in covering most compliances. While many are transitioning to cloud deployment, the current setup is still on-premises and requires expertise for proper implementation. 

Setting up everything can be done in a day if you have the necessary knowledge and resources. Personally, I've successfully implemented it for 6000 endpoints within a week.

What's my experience with pricing, setup cost, and licensing?

When it comes to pricing, I've observed an increase recently.

What other advice do I have?

I recommend the solution. Overall, I rate it a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Flag as inappropriate
PeerSpot user
Network Engineer at IBoss Tech Solutions Pvt. Ltd
Real User
Top 20
Easy to manage solution with good stability
Pros and Cons
  • "The solution has a good interface."
  • "The solution's pricing could be better."

What is our primary use case?

We use the solution to manage all incoming and outgoing traffic of the user's laptop.

What is most valuable?

The solution has good monitoring and interface features for the DPM layer.

What needs improvement?

The solution's pricing could be better compared to Kaspersky Endpoint Security.

For how long have I used the solution?

I have been using McAfee Data Protection for three to four years.

What do I think about the stability of the solution?

Stability-wise, the solution works properly.

What do I think about the scalability of the solution?

I rate the solution's scalability an eight out of ten. We have 150 users in our organization.

How are customer service and support?

The solution's customer support team's response time is good. We raise the ticket on a support portal and communicate with the technical team. They provide the best solution as soon as possible.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have used Kaspersky Endpoint Security before. We switched to McAfee because of the pricing.

What other advice do I have?

The solution is easy to manage, configure, and monitor. It also has a good UI. I rate it an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
McAfee Complete Data Protection
April 2024
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,578 professionals have used our research since 2012.
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.
Real User
Top 5
Stable solution that fulfills our customers' requirements
Pros and Cons
  • "All of the Complete Data products are valuable."
  • "Initial setup was complex."

What is our primary use case?

We use this solution for outfitting our customers.

We have a hybrid deployment.

We have many Complete Data products in versions 11.6 and 11.7.

How has it helped my organization?

Complete Data products have helped our organization. For example, some customers require that we have products with Bluetooth, pen drives, hard drives, and external and internal drives for logging into our organization.

What is most valuable?

All of the Complete Data products are valuable. We haven't had any issues.

What needs improvement?

We had to migrate and upgrade the DLP, and then customers were experiencing some unknown issues. We had to upgrade the Microsoft package on our system.

What do I think about the stability of the solution?

It's stable.

What do I think about the scalability of the solution?

We haven't had any issues with scalability.

How was the initial setup?

Initial setup was complex.

What other advice do I have?

I would rate this solution as 10 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Cyber Security Consultant at Ingram Micro Inc.
Real User
Excellent protection that is easy to use with simple access to the DLP
Pros and Cons
  • "The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage."
  • "The solution needs more advanced features."

What is our primary use case?

Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.

What is most valuable?

The solution is excellent for protecting users from data being exploited. It's also great for preventing data leakage. 

The solution is simple.

Accessing the DLP is easy.

What needs improvement?

The solution needs more advanced features.

Customers tend to not like the navigation that is offered.

While accessing the DLP is easy, navigating inside of it is difficult.

The policies and propagation need to be improved.

The solution should integrate more into the Cloud. McAfee is not focusing too much on the Cloud. They need to do so.

For how long have I used the solution?

I've been working with this solution for about 16 to 18 months.

How are customer service and technical support?

We've contacted technical support in the past and in general, they are quite good.

Which solution did I use previously and why did I switch?

We've previously used Symantec and Trend Micro. They all have similar features. All of them use privacy encryption technology, and they are all simple in terms of just deploying the agent. They offer encryption of the endpoint. There's no major difference between any of them.

How was the initial setup?

The initial setup is straightforward. It's not complex. They make it very easy to implement the solution.

For a company with approximately 100 users, deployment takes approximately ten to eleven days.

What other advice do I have?

I'm a consultant. Our company is a partner as well as a distributor.

I would recommend companies who want some solid security products to consider this solution. McAfee is well known in the market, and it has a good reputation specifically surrounding the EPO encryption. I would recommend them.

I'd rate the solution eight out of ten. I'd rate the solution higher if the navigation to the settings and propagation were more clear inside McAfee.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Global IT Manager at a pharma/biotech company with 501-1,000 employees
Real User
Allows me to define rules that protect the database beyond the built-in rules
Pros and Cons
  • "In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability."
  • "A better GUI platform would make it easier to present information to management; I would not need to fix the data before I present it."

What is our primary use case?

The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. 

I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.

How has it helped my organization?

The improvement is from the management point of view because, when implementing database security, you don't see any improvement in performance or productivity. The purpose of the product is to give visibility to management that the heart of the company is secured in the maximum way possible, and this solution is giving us that.

The report that I present to the management team shows this, that it's safe, that we are monitoring the database all the time, and the vulnerability of the database is prevented, thanks to this solution. The improvement is the security that it provides.

What is most valuable?

With this product, the performance of the database wasn't affected at all.

In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.

I came to this solution because there was a data leak from one of the internal users who was taking information from inside the company, from the ERP system. When she left the company, she was giving it to our competitors. I found a way with this product to also create a DLP solution. I got two products in one solution, so it is very efficient.

What needs improvement?

Maybe a better GUI platform; that would make it easier to present information to management, so I would not need to fix the data before I present it.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

The stability is very, very good. I was very impressed that it didn't effect the performance of the database at all. At first I put it in monitoring mode, so I could see that it's stable, and not affecting the database performance. After a month running on monitoring, I put it in prevention mode, and it did it without any performance issues. So that was great.

What do I think about the scalability of the solution?

I think scalability is very good. You can grow the product, you can add more databases to it. It depends on the license that you purchase. You can grow with the product without any issues.

How are customer service and technical support?

I'm working with a security company called Intensity. After doing my own PoC, and also checking an IBM solution, I was fine with this product. Intensity, the partner, implemented the product, and they were working with customer support of the product.

Customer support is very good, because we didn't run into any issues that weren't resolved. The implementation ran very smoothly on Oracle Database. So I would evaluate support as very good.

Which solution did I use previously and why did I switch?

I didn't use database security before this. I was protecting the data of the company with other products, not directly on the database. But when we ran into data leaks from one of the users, I searched for a DLP solution. DLP solutions, to implement in a company, are very, very complex. So I searched for another solution that would gives us the same result but in a different way, and this product did it.

How was the initial setup?

It's not straightforward. You need to have database knowledge to know which parts of the data you want to protect within the database, to map your data and tables in order to make the rules. For the basic things that the product does, the knowledge you need is straightforward for system integration. But when you're diving into the product and you want to enhance the solution, you need a DBA to protect your database in a significant way, as I was implementing it.

Which other solutions did I evaluate?

I also evaluated Nyotron. I went with McAfee for the stability, that it's handled by McAfee and they are an experienced company.

What other advice do I have?

When you're searching for a vendor, first of all you want to be secure and comfortable with the partner that you're working with. The partner can see many vendors in the industry, and is working with many companies. When he's recommending a vendor, I'm more comfortable working with that vendor. So I'm listening to my partner's recommendation, and then I start to check out those vendors.

The criteria include that it is a stable vendor, has been in the market a long time, has a good solid, financial base so it can support the product that I'm working with.

My advice would be to speak with other companies who have implemented the solution to get references.

I would rate this solution a nine out of 10.

When I'm looking for a product like this, I don't want it to interfere with the performance of my database or system. The purpose of database security is to protect our ERP system database, and if the performance is going to be harmed or affected, from a business point of view that's a big issue. This product did not affect performance.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cyber Security Engineer at a security firm with 11-50 employees
Real User
Top 5
Reliable with good data protection but needs an updated UI
Pros and Cons
  • "We can scale the solution."
  • "The UI could be improved a bit."

What is our primary use case?

We primarily use the solution to protect sensitive data and general protection.

How has it helped my organization?

The protection on offer is very good at protecting the organization. We can protect our assets and our IP.

What is most valuable?

The data protection has been very good. Customers like the product based on the amount of protection they are getting.

We can scale the solution.

It's a stable product.

What needs improvement?

The UI could be improved a bit.

Other than that, the solution has been very good.

For how long have I used the solution?

I've used the solution for about a year. 

What do I think about the stability of the solution?

It's been stable and reliable so far. There aren't bugs or glitches. It doesn't crash or freeze. 

What do I think about the scalability of the solution?

The solution is scalable. 

How are customer service and support?

We've never escalated any issues to technical support. I can't speak to how helpful or responsive they would be. 

How was the initial setup?

The solution has a moderately difficult setup. It's not easy or difficult. It's intermediate. We can deploy the product in 15 to 25 minutes on average.

At this time, I haven't noticed any necessary maintenance.  

What's my experience with pricing, setup cost, and licensing?

I'm not sure of the exact pricing of the product.

What other advice do I have?

We are using the latest version of the solution. 

I'd likely recommend the solution to others. It's a good place to start in terms of developing a security strategy.

I'd rate the solution seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.
Real User
Top 5
It lets us define roles in our data products, helping us identify something suspicious on the client's device.
Pros and Cons
  • "Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device."
  • "Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice."

What is our primary use case?

We have many clients in India using Complete Data Protection and host data protection. Complete Data Protection covers the network servers and endpoints. Okay. So with any species attachment scan with complete data production. Complete Data Protection was necessary to meet advanced customer requirements. We have around 2,250 users covered by Complete Data Protection.

What is most valuable?

Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device. 

What needs improvement?

Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice. 

For how long have I used the solution?

I have been using McAfee for five years.

How was the initial setup?

Data Protection is easy to set up. We have templates for data protection roles in each country. Once we configure the DLP roles, we deploy the agent, and the agent communicates with the EPU and the client's device. 

We have to configure the solution with the data protection role and customize it based on the customer's requirements. Finally, we test it to see if everything is working normally. Configuration takes about 30 minutes. 

What other advice do I have?

I rate McAfee Complete Data Protection 10 out of 10. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Subbu Madhira - PeerSpot reviewer
CEO at OmniNet Systems
Real User
Good compliance and accepted standards but requires more stability
Pros and Cons
  • "It is part of the DLP and works well for that use case."
  • "They could be better in terms of Complete Data Protection."

What is our primary use case?

It can be used for all mobile works laptops, which are more susceptible to data loss. Or it can be used for file servers where you put your file servers on the cloud, and so the data addresses and transit are encrypted.

What is most valuable?

They offer very good accepted standards. The solution is compliant and offers good support. They offer pretty good security due to their standards compliance. 

It is part of the DLP and works well for that use case.

What needs improvement?

They could be better in terms of Complete Data Protection. There are a lot of components that get involved there. 

I would like to see a bit more stability.

The initial setup process could be simpler. 

For how long have I used the solution?

I've used the solution for the last four years or so.

What do I think about the stability of the solution?

I haven't used it much, and therefore cannot speak to the overall stability, although I would like it to be more stable in general. We've faced problems on and off.

What do I think about the scalability of the solution?

Having not used it very much, I have never tried to scale the product.

How was the initial setup?

It is a complicated initial implementation process. The implementation is not straightforward. My File and Folder protection take at least two days to three days to fix and deploy. To get all the end-users on, it might take three or so days. 

What's my experience with pricing, setup cost, and licensing?

You do need to purchase a license in order to use the solution. 

What other advice do I have?

It is a pretty good product. Overall, I would rate it a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros sharing their opinions.