

Symantec Endpoint Encryption and McAfee Complete Data Protection compete in the data security market. Symantec is seen as providing a more integrated enterprise solution due to its robust feature set, while McAfee stands out for its data loss prevention capabilities.
Features: Symantec Endpoint Encryption excels in encryption capabilities, ease of integration, and centralized management. It offers robust reporting and expandability. McAfee is highlighted for effective data loss prevention, strong device and media control, and its versatile ePolicy Orchestrator management tool.
Room for Improvement: Symantec users desire better support integration, streamlined agent management, and reduced user-side interaction. They also call for improved stability and agile update processes. McAfee users seek enhancements in user management, intuitive interfaces, and optimized resource utilization, along with better technical support and documentation.
Ease of Deployment and Customer Service: Both solutions are primarily available as on-premises deployments. Symantec offers limited cloud options, while McAfee has integrated hybrid capabilities. Users report mixed support experiences, with Symantec affected by organizational changes and McAfee noted for response speed but needing better problem resolution.
Pricing and ROI: Symantec's pricing is perceived as high but reasonable for its feature set and scalability, considered cost-effective for large environments. Pricing experiences vary. McAfee is viewed as moderately priced, delivering value relative to its features. Both solutions enhance productivity and data protection, though Symantec faces criticism for higher costs.
I've spoken to support engineers out of the USA, and they're excellent. They know what they're talking about. They're passionate about the product.
I would rate the technical support from Symantec as nine out of ten.
I would rate the scalability of Symantec Endpoint Encryption a nine.
I have been using Symantec Endpoint Encryption for many years, and I find it to be a reliable solution.
On a technical level, when I draw a comparison between McAfee Complete Data Protection and CrowdStrike, McAfee Complete Data Protection is a one out of ten, and then CrowdStrike is a ten out of ten.
They must improve or address USB-bound viruses and external media-bound viruses properly in McAfee Complete Data Protection.
Based on my experience, technically, the product already meets all our requirements.
Support can sometimes be a problem, although not always.
McAfee Complete Data Protection has its own encryption version, and it works independently.
The most valuable function of Symantec Endpoint Encryption is the integration with our current endpoint protection solution and its administration because it is already integrated with our operating system to Microsoft.
It provides an easy-to-install dashboard that gives a clear understanding of the organization's status regarding encryption and other features.
| Product | Market Share (%) |
|---|---|
| Symantec Endpoint Encryption | 8.3% |
| McAfee Complete Data Protection | 6.5% |
| Other | 85.2% |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 19 |
| Midsize Enterprise | 7 |
| Large Enterprise | 16 |
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses. According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and often internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority. McAfee Complete Data Protection Suites address all of these concerns and many more.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.