I use this solution to protect my notebook.
This is an on-premise deployment that was installed by my company on my notebook.
I use this solution to protect my notebook.
This is an on-premise deployment that was installed by my company on my notebook.
I don't need to have any interaction with this product, which means that it is very, very good, and it is doing its job.
The price of this solution needs to be improved.
This solution does not do as well at protecting the end-user against unknown viruses.
I have never had any issues with this solution.
My understanding is that it was easy to deploy. It was done very quickly, and I have not noticed any issues with the notebook since the installation.
Our in-house IT department handled the implementation.
This product is perfect, just too expensive.
I would rate this solution a seven out of ten.
With this solution, the device control is more reliable and more stable. We even use it for our email policies, but we are mainly using it in our environment for device protection policies. We are controlling almost all types of devices, like USB and CD-ROM devices, imaging devices, and even cameras. So we are basically able to control everything in our environment.
If you compare this solution with next-generation products like CrowdStrike, you will find that it should be easier to work on and therefore more user-friendly. With this solution, data protection is not straightforward. So McAfee should focus more on ease of management and user-friendliness.
I would also like to have an option to migrate from the old environment to the new, graphical environment. The interface itself is not easy for administrators because they have to check everything. The integration of AD users in the DLP can also improve as well as taking reports. For instance, if a user wants information on the kind of report in the DLP, I can currently not look at it. I need to get a proper DLP report.
Also, if my management is asking a report, I must be able to tell how many users' USB is blocked. Right now I am not able to see what policy I implemented and how many users I have. Those are the basic things that McAfee should improve during the migration process. It should be straightforward.
The solution is very stable.
I believe it is scalable but there is always room for improvement. I like the ease of management and you can add the how-to, create a policy, and make new sections. I prefer CrowdStrike's device control when it comes to email policies because it is more straightforward. I believe it is because everything is moving towards the Cloud now. I'm not saying that McAfee is not going to the Cloud, but the product can be more advanced. I still personally feel that, even for a small-sized company, mid-sized company, or even a company with more than 2000, 5000 users, this product is really good.
The technical support of McAfee is good and that is why we use McAfee products. The support and protection is very prompt.
The initial setup is easy and straightforward and we didn't experience any complications. What I like, is that the data is basically integrated with McAfee so you can use the afim interface for integration. It is straightforward to implement your DLP with the afim server.
We use Email Gateway, but now we use a couple of McAfee products like the antivirus and DLP.
My advice to others who are looking for a DLP solution, a data protection solution, would be to go for it. Along with the antivirus protection, I would definitely suggest the company to go for the next generation in antivirus or EDR or sensing technology which is currently more available in the market. There is more, newer technology on the market today. And antivirus properties of McAfee technology, like scanning the viruses and things like that, is more traditional, conventional technology. I will not say to go ahead with the antivirus, but McAfee's DLP data protection is still very good and it is one of the stable solutions on the market. I will rate it a seven out of ten.
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more.
I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.
The improvement is from the management point of view because, when implementing database security, you don't see any improvement in performance or productivity. The purpose of the product is to give visibility to management that the heart of the company is secured in the maximum way possible, and this solution is giving us that.
The report that I present to the management team shows this, that it's safe, that we are monitoring the database all the time, and the vulnerability of the database is prevented, thanks to this solution. The improvement is the security that it provides.
With this product, the performance of the database wasn't affected at all.
In addition, it is easy to use, and you can define rules that protect the database beyond the built-in rules of the product. I found another purpose for the product besides the basic things that it does, protecting the database: privileged use, weak authentication, SQL injection and and database platform vulnerability.
I came to this solution because there was a data leak from one of the internal users who was taking information from inside the company, from the ERP system. When she left the company, she was giving it to our competitors. I found a way with this product to also create a DLP solution. I got two products in one solution, so it is very efficient.
Maybe a better GUI platform; that would make it easier to present information to management, so I would not need to fix the data before I present it.
The stability is very, very good. I was very impressed that it didn't effect the performance of the database at all. At first I put it in monitoring mode, so I could see that it's stable, and not affecting the database performance. After a month running on monitoring, I put it in prevention mode, and it did it without any performance issues. So that was great.
I think scalability is very good. You can grow the product, you can add more databases to it. It depends on the license that you purchase. You can grow with the product without any issues.
I'm working with a security company called Intensity. After doing my own PoC, and also checking an IBM solution, I was fine with this product. Intensity, the partner, implemented the product, and they were working with customer support of the product.
Customer support is very good, because we didn't run into any issues that weren't resolved. The implementation ran very smoothly on Oracle Database. So I would evaluate support as very good.
I didn't use database security before this. I was protecting the data of the company with other products, not directly on the database. But when we ran into data leaks from one of the users, I searched for a DLP solution. DLP solutions, to implement in a company, are very, very complex. So I searched for another solution that would gives us the same result but in a different way, and this product did it.
It's not straightforward. You need to have database knowledge to know which parts of the data you want to protect within the database, to map your data and tables in order to make the rules. For the basic things that the product does, the knowledge you need is straightforward for system integration. But when you're diving into the product and you want to enhance the solution, you need a DBA to protect your database in a significant way, as I was implementing it.
I also evaluated Nyotron. I went with McAfee for the stability, that it's handled by McAfee and they are an experienced company.
When you're searching for a vendor, first of all you want to be secure and comfortable with the partner that you're working with. The partner can see many vendors in the industry, and is working with many companies. When he's recommending a vendor, I'm more comfortable working with that vendor. So I'm listening to my partner's recommendation, and then I start to check out those vendors.
The criteria include that it is a stable vendor, has been in the market a long time, has a good solid, financial base so it can support the product that I'm working with.
My advice would be to speak with other companies who have implemented the solution to get references.
I would rate this solution a nine out of 10.
When I'm looking for a product like this, I don't want it to interfere with the performance of my database or system. The purpose of database security is to protect our ERP system database, and if the performance is going to be harmed or affected, from a business point of view that's a big issue. This product did not affect performance.
