

Symantec Endpoint Encryption and McAfee Complete Data Protection compete in the data security market. Symantec is seen as providing a more integrated enterprise solution due to its robust feature set, while McAfee stands out for its data loss prevention capabilities.
Features: Symantec Endpoint Encryption excels in encryption capabilities, ease of integration, and centralized management. It offers robust reporting and expandability. McAfee is highlighted for effective data loss prevention, strong device and media control, and its versatile ePolicy Orchestrator management tool.
Room for Improvement: Symantec users desire better support integration, streamlined agent management, and reduced user-side interaction. They also call for improved stability and agile update processes. McAfee users seek enhancements in user management, intuitive interfaces, and optimized resource utilization, along with better technical support and documentation.
Ease of Deployment and Customer Service: Both solutions are primarily available as on-premises deployments. Symantec offers limited cloud options, while McAfee has integrated hybrid capabilities. Users report mixed support experiences, with Symantec affected by organizational changes and McAfee noted for response speed but needing better problem resolution.
Pricing and ROI: Symantec's pricing is perceived as high but reasonable for its feature set and scalability, considered cost-effective for large environments. Pricing experiences vary. McAfee is viewed as moderately priced, delivering value relative to its features. Both solutions enhance productivity and data protection, though Symantec faces criticism for higher costs.
I've spoken to support engineers out of the USA, and they're excellent. They know what they're talking about. They're passionate about the product.
I would rate the technical support from Symantec as nine out of ten.
I would rate the scalability of Symantec Endpoint Encryption a nine.
I have been using Symantec Endpoint Encryption for many years, and I find it to be a reliable solution.
On a technical level, when I draw a comparison between McAfee Complete Data Protection and CrowdStrike, McAfee Complete Data Protection is a one out of ten, and then CrowdStrike is a ten out of ten.
They must improve or address USB-bound viruses and external media-bound viruses properly in McAfee Complete Data Protection.
Based on my experience, technically, the product already meets all our requirements.
Support can sometimes be a problem, although not always.
McAfee Complete Data Protection has its own encryption version, and it works independently.
The most valuable function of Symantec Endpoint Encryption is the integration with our current endpoint protection solution and its administration because it is already integrated with our operating system to Microsoft.
It provides an easy-to-install dashboard that gives a clear understanding of the organization's status regarding encryption and other features.
| Product | Mindshare (%) |
|---|---|
| Symantec Endpoint Encryption | 8.1% |
| McAfee Complete Data Protection | 6.3% |
| Other | 85.6% |
| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 5 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 19 |
| Midsize Enterprise | 7 |
| Large Enterprise | 16 |
McAfee Complete Data Protection offers advanced security features like data loss prevention, encryption, and a centralized ePO management console, ensuring comprehensive protection against data leakage and unauthorized access while providing flexible configuration and frequent updates.
McAfee Complete Data Protection stands out in device control, threat protection, and advanced data classification with an intuitive interface. It is scalable and integrates efficiently with platforms, providing USB, network, and application control while ensuring GDPR compliance. It protects sensitive data and shields against external threats with advanced encryption and threat protection capabilities. Frequent updates and flexible configurations make it a reliable choice for managing user traffic and confidential information classification, though improvements in Mac/Linux support and GUI usability are needed.
What are the key features of McAfee Complete Data Protection?McAfee Complete Data Protection sees implementation across industries with endpoint protection, encryption, and compliance management as primary uses. Financial services, healthcare, and educational institutions use its capabilities for securing sensitive data, classification of confidential information, and integration with platforms for comprehensive data security.
Symantec Endpoint Encryption provides centralized management and robust encryption, making it a valued security tool for protecting critical data across multiple devices and platforms in industries like finance and government.
Symantec Endpoint Encryption offers seamless integration and scalable security capabilities. Users value its centralized management, strong dashboard, and email protection. Known for ease of use, it supports disk and file encryption, policy assignment, and synchronization of enterprise databases with minimal technical support. Users note challenges in remote deployment and complex manual installations, seeking more intuitive interfaces and better technical support. Performance impact, pricing, and integration with Symantec offerings are areas of concern.
What are the top features of Symantec Endpoint Encryption?Symantec Endpoint Encryption is widely used in finance and government sectors, offering encryption solutions for emails, mobile devices, and critical documents. It addresses endpoint security and compliance, deploying both on-cloud and on-premises to safeguard drives, accounts, and data, crucial for clients with strict compliance policies.
We monitor all Endpoint Encryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.