Try our new research platform with insights from 80,000+ expert users
Presales Manager at a computer software company with 501-1,000 employees
Real User
Gives accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss
Pros and Cons
  • "With McAfee Complete Data Protection, you can managed all your security solutions from one single server and one interface. This might be the most powerful advantage of McAfee's solution."
  • "The product consumes too much RAM and CPU for its processing and this can lead to resource issues on PCs."

What is our primary use case?

We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution.  

Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home.  

Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.  

What is most valuable?

Often the customers have requirements where we need to provide them with endpoint DLP (Data Loss Prevention) solutions. McAfee's DLP is a very good product. It gives you accessibility to either allow or block many preferences on a machine and does a good job of protecting against any data loss. This is what I think is the most valuable feature in the solution.  

What needs improvement?

The improvement that I think most needs to be addressed is a claim from many customers that I receive all the time. They say that the product consumes too much RAM and CPU. It makes clones in the machine and that eats up resources.  

It makes the clone as long as it is running on the machine. The problem is big enough for users that I need to have another smart, reliable solution that can be deployed instead if the customer does not have the hardware to allow the product to consume the needed volume of RAM and CPU. If McAfee were able to do all it does without stealing so much of the resources on a machine, I would not have this problem of having to consider other deployments.  

For how long have I used the solution?

We have been using the solution for between six or seven years. Earlier it was called VSP. At that time it was not complete all-in-one protection. It has been only for maybe two or three years they have changed the name to Complete Data Protection and made this well-integrated product.  

Buyer's Guide
McAfee Complete Data Protection
August 2025
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,164 professionals have used our research since 2012.

What do I think about the stability of the solution?

From my point of view, the product is very stable and the support team is very responsive. If they release a new update and there was a bug or something, they release a patch or fix for it very quickly.  

What do I think about the scalability of the solution?

The scalability of the solution is there. McAfee is one of the oldest security companies. They have been creating and releasing security solutions since 1987, so they know what they are doing and they do it well.  

We deploy the solution to medium and enterprise clients so it can scale up and handle larger clients.  

How are customer service and support?

Essentially, as a service delivery partner, we are also technical support to some level.  

Which solution did I use previously and why did I switch?

Because we deploy for clients, we work with a variety of solutions in order to meet their needs. While I am working mostly with McAfee solutions, I'm also very familiar with the broader classification of security solutions. I have worked with various PAM (Privileged Access Management) solutions. I don't only work with McAfee portfolio or their security products but it is what I deploy most often. I am familiar with Symantec, LogRhythm SIEM solution, and Forcepoint. Also, I have worked with security solutions for USB, for the web, for email, and for secure file transfer solutions, so I am very familiar with a lot of security solutions and how they work.  

The main difference between McAfee Complete Data Protection and other solutions is that McAfee has a strong point as a comprehensive security solution. With Endpoint Security, you don't have to have different management interfaces to manage your endpoint solutions. It all can be managed from one single server in one interface. This might be their main and most powerful advantage because users do not have to mix and matching various products to accomplish what a security suite can. They also do not have to deal with potential incompatibilities.  

How was the initial setup?

The initial setup is something I have done often so it is very clear how to do it and it is easy for me.  

On average it takes very little time to deploy. For the management console EPO (ePolicy Orchestrator) it is a maximum of maybe half an hour for it to be deployed. It depends on the server. Deploying the endpoint from the management console also does not take much time. If the network and the firewall ports are open, normally it takes only 5 to 10 minutes and you can deploy it in batches of 50 or 100 machines in each batch. So the total time depends on how many batches, but the installation on the machines can take as little as 5 to 10 minutes.   

What about the implementation team?

We do all of our own implementations and the implementations for clients as well.  

What other advice do I have?

The advice I have for people considering this type of security solution is not to listen to what all the companies advertise. You can see bad reviews, maybe good reviews as well, but you need to use that information from the reviews as a starting point for your own observations and not just believe what reviews say. I know some reviews on the internet are fair, but some reviews are not. Try to do a POC (Proof of concept) and conduct testing for yourself. Define your policies as per your requirements for your situation and your company and choose products that meet the needs of that model. If you want to install any solution with the default policies, it will probably not fit your requirements exactly. You will need to do enhancements and fine-tune the solution, so you will need a solution that can be tuned. Give the solutions a try. Do the POC for one or two months and then you can decide if it is a good solution for you.  

On a scale from one to ten where one is the worst and ten is the best, I would rate this product as an eight of ten. To make it ten or even a nine, they need to resolve the issues with how the solution consumes PC resources.  

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.
Real User
Stable solution that fulfills our customers' requirements
Pros and Cons
  • "All of the Complete Data products are valuable."
  • "Initial setup was complex."

What is our primary use case?

We use this solution for outfitting our customers.

We have a hybrid deployment.

We have many Complete Data products in versions 11.6 and 11.7.

How has it helped my organization?

Complete Data products have helped our organization. For example, some customers require that we have products with Bluetooth, pen drives, hard drives, and external and internal drives for logging into our organization.

What is most valuable?

All of the Complete Data products are valuable. We haven't had any issues.

What needs improvement?

We had to migrate and upgrade the DLP, and then customers were experiencing some unknown issues. We had to upgrade the Microsoft package on our system.

What do I think about the stability of the solution?

It's stable.

What do I think about the scalability of the solution?

We haven't had any issues with scalability.

How was the initial setup?

Initial setup was complex.

What other advice do I have?

I would rate this solution as 10 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
McAfee Complete Data Protection
August 2025
Learn what your peers think about McAfee Complete Data Protection. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,164 professionals have used our research since 2012.
Sunil  Kumar - PeerSpot reviewer
Security Specialist at Hitachi Systems, Ltd.
Real User
It lets us define roles in our data products, helping us identify something suspicious on the client's device.
Pros and Cons
  • "Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device."
  • "Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice."

What is our primary use case?

We have many clients in India using Complete Data Protection and host data protection. Complete Data Protection covers the network servers and endpoints. Okay. So with any species attachment scan with complete data production. Complete Data Protection was necessary to meet advanced customer requirements. We have around 2,250 users covered by Complete Data Protection.

What is most valuable?

Complete Data Protection lets us define roles in our data products. It helps us identify something suspicious on the client's device. 

What needs improvement?

Some clients still receive spam and malware in their attachments, so the data protection isn't working correctly. We have configured it and enabled the features in the client's system, but some policies have failed to work once or twice. 

For how long have I used the solution?

I have been using McAfee for five years.

How was the initial setup?

Data Protection is easy to set up. We have templates for data protection roles in each country. Once we configure the DLP roles, we deploy the agent, and the agent communicates with the EPU and the client's device. 

We have to configure the solution with the data protection role and customize it based on the customer's requirements. Finally, we test it to see if everything is working normally. Configuration takes about 30 minutes. 

What other advice do I have?

I rate McAfee Complete Data Protection 10 out of 10. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1219365 - PeerSpot reviewer
Storage Engineer at 22by7
Real User
User-friendly, easy to set up, and scalable
Pros and Cons
  • "Technical support is very helpful."
  • "There are compatibility issues with the Chrome browser."

What is our primary use case?

We primarily provide services to our clients.

Clients usually use the solution mainly to audit GDPR compliance. As for the audit, they need to meet their compliance, the PCI DSS compliance, and GDPR compliance. Based on that they procure the DLP solution.

What is most valuable?

The classification front-end and the features for the endpoint are great aspects of the product. 

It works absolutely fine for the customer requirements.

It's user-friendly and easy to navigate.

The initial setup is very easy.

Technical support is very helpful. 

The stability is good. 

The product can scale. 

What needs improvement?

There are compatibility issues with the Chrome browser. The DLP works absolutely fine with the internet and the Firefox browser, however, it doesn't support Chrome. That's the only drawback of the DLP. Even if there is a new patch released in Chrome, McAfee DLP doesn't support it.

There are a lot of incidents that are being captured and there is no option for deleting the older incidents from the console. However, if you want to treat that incident, then I think there is some task that has to be done and it doesn't work in the right way. We had to run some more subscriptions this year to reduce the incidents.

For how long have I used the solution?

I've used the solution for around ten years or so. Maybe even longer. It's been a long time. 

What do I think about the stability of the solution?

I would rate the stability at an eight out of ten. It's pretty reliable. There aren't really any bugs or glitches and it doesn't crash or freeze. 

What do I think about the scalability of the solution?

The scalability is okay. I would rate it at an eight out of ten. 

How are customer service and technical support?

Technical support is absolutely fine. I have very good friends in support. Most of the time, most of my friends are working there, and I get connected with them. There aren't any problems. I'm quite satisfied with their level of knowledge and helpfulness. 

How was the initial setup?

The initial setup is straightforward. It's very simple to deploy. It's just in a matter of five to ten minutes of checking out everything. On top of that, policies can be configured within 30 to 40 minutes. In that time, everything can be set up.

What's my experience with pricing, setup cost, and licensing?

The pricing is reasonable. Of course, it could always technically be cheaper, however, as a company that is a systems integrator, we tend to get more margin.

What other advice do I have?

We are service providers, not customers. We're a platinum partner.

I'd recommend the solution to other companies. It's more than just an antivirus. It helps with compliance. 

However, I would advise a company that is considering buying it to understand what it can do and how it works in order to ensure it meets the needs of the organization.

I'd rate the solution at an eight out of ten. We're mostly quite satisfied with its capabilities. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Senior Technical Team Lead at Foresight Software Solutions Pvt Ltd
Reseller
Scans and protects data-at-rest
Pros and Cons
  • "With respect to data loss prevention, I think it is helpful to the customer."
  • "There are some features that do not work with Mac."

What is our primary use case?

We have huge clients, like Toshiba, Bangalore International Airport, Viacom, and other companies.

What is most valuable?

With respect to data loss prevention, I think it is helpful to the customer; except for a few limitations with Mac. 

What needs improvement?

The full set of features are enabled only for Windows. There are some features that do not work with Mac. With respect to device control, it can be quite limited for Mac.

With Mac, we experience problems with post-related issues, with the device controller, and with email-related listings. Network communication is another thing. Certain rules just do not work for our Mac environments.

The security could also be improved when it comes to Mac. Most of our customers ask for these features. They want these same features for their Mac devices. We're just hosts — it's up to McAfee to provide these features.

They should also offer encryption and device control for Linux.

For how long have I used the solution?

We have been reselling McAfee Complete Data Protection for seven years.

What do I think about the stability of the solution?

McAfee Complete Data Protection is both stable and scalable.

How are customer service and technical support?

The technical support is good. It's easy for us to reach support whenever we experience any issues. They put us right through to human beings — we don't have to converse with a robot first. 

How was the initial setup?

This solution is easy to deploy and maintain.

What's my experience with pricing, setup cost, and licensing?

McAfee Complete Data Protection is a little bit expensive. The price could be lower. In regard to data loss prevention, we have different licensing.

What other advice do I have?

We need to check a customer's environment and infrastructure before recommending this solution. Based on that, we can then decide on the type of setup they'll require. Later on, when their new environment increases, they're able to scale up easily.

On a scale from one to ten, I would give McAfee Complete Data Protection a rating of nine.

Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
reviewer1507008 - PeerSpot reviewer
Lead Cyber Security Consultant at a security firm with 501-1,000 employees
Consultant
Unified management console and scales well, but we need more granular control over the policies
Pros and Cons
  • "The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud."
  • "We are looking for more granular control over the policies."

What is our primary use case?

We are a solution provider and this is one of the security products that we implement for our clients. I focus primarily on data protection and data loss prevention solutions, and in this role, I work with McAfee Complete Data Protection a lot. We also use it for encryption.

A simple use case would be keywords and reject detection.

Other reasons that we use it are for PII and PCI compliance.

What is most valuable?

The most valuable feature is the unified management console, ePO. The console allows us to manage not only endpoint protection, but DLP, and also integration with MVISION Cloud.

What needs improvement?

We are looking for more granular control over the policies. McAfee has some challenges in this regard.

For how long have I used the solution?

I have been working with McAfee Complete Data Protection

What do I think about the stability of the solution?

There are some challenges with stability when you want to fine-tune the granularity. When it is too generic, you get a lot of false-positive errors.

What do I think about the scalability of the solution?

I don't think that McAfee has any scalability-related issues because they deal with a lot of enterprise companies.

Our clients are typically the public sector, although we have a lot of large, enterprise customers as well.

How are customer service and technical support?

The most important thing is how they enable our team. They provide us with good support during the pre-sales stages.

How was the initial setup?

The initial setup for McAfee is straightforward, and not very complex. The fine-tuning, however, takes time.

What other advice do I have?

We can see that a lot of things are moving to the cloud, and I want to see more cloud solutions and more integration where we can make use of them. As time goes on, we can see that there are more customers on the cloud.

I would rate this solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
Product Manager at Axoft Ukraine
Real User
A data protection solution with valuable security features
Pros and Cons
  • "The most valuable feature is security."
  • "The price is a little high and could be better."

What is our primary use case?

We use it, for example, for USB devices. When we are using USB devices, we have to put the password to open the USB stick. Without it, we cannot use the USB stick anywhere.

How has it helped my organization?

We can use our devices more securely. Therefore, it protects us from data loss, and therefore, it's very helpful for us. The biggest lesson we have learned is that security is very important in business.

What is most valuable?

The most valuable feature is security.

What needs improvement?

The price is a little high and could be better.

For how long have I used the solution?

I have been using McAfee Complete Data Protection for about two years. 

What about the implementation team?

We implemented this solution by ourselves.

What's my experience with pricing, setup cost, and licensing?

I think the price could be a little bit less.

What other advice do I have?

I would tell potential users that automatic update distribution would be very useful for such solutions. Doing it manually is very hard work.

On a scale from one to ten, I would give McAfee Complete Data Protection a nine.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Technical Security Engineer at Hitachi Systems, Ltd.
Real User
Some of the features that have been most valuable include the firewall protection, wave control, and data loss protection
Pros and Cons
  • "I am satisfied with the customer service/technical support."
  • "In terms of where the solution could improve, it could integrate with network solutions for ADTs, email web gateways and discovery."

What is our primary use case?

The main use case of this solution is identifying bad actors (criminals) who want to steal data and locking them out of areas that require authentication.

What is most valuable?

Some of the features that have been most valuable include the firewall protection, wave control, and data loss protection.

What needs improvement?

In terms of where the solution could improve, it could integrate with network solutions for ADT,email web gateway and discovery.

For how long have I used the solution?

I have been using this solution for eight

How are customer service and technical support?

I am satisfied with the customer service/technical

Which solution did I use previously and why did I switch?

Before using this solution, we used Symantec andAjeet Kumar:
And also will we on the [inaudible 00:06:03] the Symantec and Telmicro and also the first client which we also have leveled this process. And also I'm working with the first client, the CSM completely [inaudible 00:06:12] and prop C and with everything. First one

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros sharing their opinions.
Updated: August 2025
Product Categories
Endpoint Encryption
Buyer's Guide
Download our free McAfee Complete Data Protection Report and get advice and tips from experienced pros sharing their opinions.