Try our new research platform with insights from 80,000+ expert users
reviewer1447320 - PeerSpot reviewer
CISO at a manufacturing company with 10,001+ employees
Real User
Very stable solution with good value but lacks easy cloud compatibility
Pros and Cons
  • "I think the costing is fine compared to other products. Cost-wise you definitely get value for your money."
  • "We would like to see all the features available on cloud."

What is our primary use case?

McAfee Endpoint Security can be used for threat protection, for malware protection, and for data loss prevention by encrypting the end user devices using full depth encryption.

We are using the latest version minus two because we generally update the antivirus to the current version after testing it. So generally it is two versions behind.

We have three versions in our network, one is the latest version, then we have a minus one on critical machines and minus two on the endpoints.

What is most valuable?

The most valuable feature of McAfee Endpoint Security is that it is stable. It is a good product.

What needs improvement?

In terms off what could be improved, it is a little bit slow.

Additionally, the encryption part definitely needs to be improved.

We have faced certain issues recovering the data from systems which could not be fully encrypted by McAfee and then the decryption was a nightmare, it took a lot of time. Some could not even be recovered. That was one issue. 

The endpoint protection and anti malware features are good. But encryption and decryption are a bit slow and it's a tedious job.

The second issue is that the public dashboards are out-of-the box kinds of features, so they need to be configured, which takes a lot of time.

Finally, there is an issue with the device timing features for allowing certain devices within the network for what we call USB protection. For master devices or static Bluetooth devices which need to be connected, the white-listing of those devices needs to be more straightforward, it is currently highly technical.

The dashboard and encryption should be improved. 

There is a cloud-based environment available from McAfee which is called MOVE. If the customer has already implemented it on-premises, it should be integratable with the MOVE version. We discussed this with McAfee and they said encryption data can not be moved to cloud. This means if I move my antivirus server to the cloud, I still need to maintain a separate encryption server within my network. That is the challenge.

We would like to see all the features available on cloud.

For how long have I used the solution?

I have been using McAfee Endpoint Security for three years.

Buyer's Guide
Trellix Endpoint Security Platform
July 2025
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
865,295 professionals have used our research since 2012.

What do I think about the stability of the solution?

McAfee Endpoint Security is a stable product. 

What do I think about the scalability of the solution?

In terms of scalability, as of now, we have licensing for 2000 users. We originally purchased it for 1800 users. Now we have renewed it for another year for 2000 users.

It's not scalable now because we have endpoint detection and response, the new technology which has been released by many companies, including McAfee. If we need to move to EDR, we will need to remove this and to implement the EDR across different products.

We require three people to deploy and maintain the solution.

Which solution did I use previously and why did I switch?

Before switching to McAfee Endpoint Security, we were using Trend Micro.

How was the initial setup?

The initial installation went on for two and a half months.

It was straightforward for Endpoint Protection Antivirus for encryption, but it took some time. This McAfee encryption had some issues with Windows 8 and Windows 7 older versions. For new versions it runs smoothly.

What about the implementation team?

When we implemented three years back we used a system integrator, our partners, for doing the installation.

We have 1700+ systems so we needed to be setup with this solution.

What's my experience with pricing, setup cost, and licensing?

I think the costing is fine compared to other products. Cost-wise you definitely get value for your money.

What other advice do I have?

We have already recommended it.

On a scale of one to ten I would rate McAfee Endpoint Security as a seven.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
AndyChan3 - PeerSpot reviewer
General manager at a tech services company with 201-500 employees
Real User
Top 10
Easy to use, the dashboard is good, and it offers better coverage than similar products
Pros and Cons
  • "The most valuable feature is ease of use."
  • "I would like to see more integration with third-party products."

What is our primary use case?

We use this solution for endpoint protection, CASB, and it is integrated with Office 365.

What is most valuable?

The most valuable feature is ease of use.

The dashboard is quite good.

What needs improvement?

I would like to see more integration with third-party products.

Pricing is always something that can be improved.

In the future, this product should make use of artificial intelligence and machine learning technology.

For how long have I used the solution?

We have been using McAfee Endpoint Security for more than 10 years.

What do I think about the stability of the solution?

The stability is good and we haven't had any issues.

What do I think about the scalability of the solution?

Scalability-wise, McAfee is a good product.

How are customer service and technical support?

The technical support from McAfee is about average.

Which solution did I use previously and why did I switch?

We use Symantec as well as McAfee for endpoint protection.

We have found that McAfee has better coverage when compared to Symantec.

What's my experience with pricing, setup cost, and licensing?

The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees.

What other advice do I have?

In summary, this is a good product and they have most aspects covered. That said, it needs better integration with third-party products. Even the integration with other McAfee products can be improved further.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trellix Endpoint Security Platform
July 2025
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
865,295 professionals have used our research since 2012.
it_user1395708 - PeerSpot reviewer
Technical Executive at Digitaltrack
Real User
User-based policies offer fine granularity, and the technical support is reponsive
Pros and Cons
  • "The most valuable feature is user-based policy provision."
  • "A policy-editing console should be added."

What is our primary use case?

We are a solution provider and McAfee MVISION Endpoint is one of the products that we implement for our clients. Our clients use it to help manage their security.

What is most valuable?

The most valuable feature is user-based policy provision. It allows for greater granularity.

Our clients use the VPN to create secure connections to their servers.

What needs improvement?

A policy-editing console should be added.

Having automatic updates would be helpful.

For how long have I used the solution?

We have been dealing with this product for about two years.

What do I think about the stability of the solution?

We are completing two deployments each week and I don't have any comments with regards to stability. I would say that it's stable enough.

What do I think about the scalability of the solution?

We have about 20 clients who are using this solution and it is easy to scale. I would estimate the number of users to be about 400.

How are customer service and technical support?

McAfee has good support and they are very responsive.

Which solution did I use previously and why did I switch?

We deal with endpoint solutions from several vendors including Sophos, Symantec, and CrowdStrike. We are still using Symantec in parallel with McAfee.

The capabilities of these products are similar and the real difference is in the support. McAfee has the best support nowadays, as Symantec takes too long to respond.

How was the initial setup?

The initial setup sometimes has to be done manually because of issues with Active Directory. That said, it is not normally complex. Complexity can come from using export files because McAfee does not have a policy-editing console.

One of the recent deployments we completed required three of us 15 days. This including training people in different locations.

What about the implementation team?

We implement and deploy this product for our clients.

What's my experience with pricing, setup cost, and licensing?

Licensing fees are billed on a yearly basis.

What other advice do I have?

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1097622 - PeerSpot reviewer
Technical Lead Specialist at a computer software company with 1,001-5,000 employees
Real User
Intrusion prevention that detects threats and protects your network, with good support
Pros and Cons
  • "The most valuable features are the prevention layer that detects the signature value and prevents threats in the network."
  • "The resolution time should be faster."

What is our primary use case?

The primary use case of this solution is for intrusion prevention.

We are service providers.

What is most valuable?

The most valuable features are the prevention layer that detects the signature value and prevents threats in the network.

What needs improvement?

The reporting could be improved, by providing more reporting features.

The resolution time should be faster.

For how long have I used the solution?

I have been working with McAfee Endpoint for more than ten years.

What do I think about the stability of the solution?

We have experienced a few issues.

How are customer service and technical support?

I have contacted technical support and they are good.

How was the initial setup?

The initial setup was straightforward.

It takes two days to deploy.

What about the implementation team?

We did not use a vendor or an integrator, we have our own team.

What other advice do I have?

I have experience with multiple vendors and this is a product I recommend.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Senior Consultant at SCPD
Consultant
A stable solution with good technical support
Pros and Cons
  • "McAfee EndPoint Security has a lot of good features that work well if they are implemented properly."
  • "I would like this solution to do what Palo Alto traps does because I would only need to run this one product."

What is our primary use case?

This is part of our network security solution. We have it running on different servers and workstations that are on different platforms.

What is most valuable?

McAfee EndPoint Security has a lot of good features that work well if they are implemented properly.

What needs improvement?

This solution is difficult to implement. There are lots of features but it has to be implemented the right way.

I would like this solution to do what Palo Alto traps does because I would only need to run this one product.

For how long have I used the solution?

I have been using McAfee Endpoint Security for perhaps the last ten years.

What do I think about the stability of the solution?

It is stable, once it is configured and set up properly.

How are customer service and technical support?

The technical support is good but the local people are bad.

How was the initial setup?

On the workstation, the initial setup is easy.

For the server, it takes a long time for your people to implement it.

What other advice do I have?

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT Security Engineer at MILLENNIUM TECHNOLOGIES
Reseller
Offers good integration between the environments
Pros and Cons
  • "The most valuable feature is the integration between environments."
  • "I would like to see simple processing and reporting online."

What is most valuable?

The most valuable feature is the integration between environments.

What needs improvement?

Something that needs to improve is the interface. I would also like to see simple processing and reporting online. 

For how long have I used the solution?

I've been using this solution for six months now.

What do I think about the stability of the solution?

The stability of the solution was not very good.

What do I think about the scalability of the solution?

We had some issues with the scalability but it was taken care of. It can be improved, however. 

What other advice do I have?

I will rate this solution an eight out of ten. In the next version I would like to see an improvement in the scalability and stability. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
product manager at MCS
Reseller
Detects malicious behavior across all common and controlled traffic throughputs
Pros and Cons
  • "The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow."
  • "The investigation and forensic analysis have been most helpful."
  • "They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input."
  • "If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues."

What is our primary use case?

FireEye Endpoint Security is positioned as an Endpoint Detection and Response (EDR) product. 

We are a distributor of the FireEye product. We offer a combination FireEye package. We offer the product in many sectors, like banking and government.

We use the latest version.

We offer it in a private cloud model for our customers who want to build a security operations centers in their environment.

What is most valuable?

The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow. Detects multi stages attacks based on MVX analytics engine which detects zero-day, multi-flow and other evasive attacks with dynamic, signature-less analysis in a safe, virtual environment. It stops infection and compromise phases of the cyber-attack kill chain by identifying never-before-seen exploits and malware.

It has capabilities like machine learning and endpoint protection as an antivirus.

The investigation and forensic analysis have been most helpful.

What needs improvement?

They could use a Host Intrusion Prevention System (HIPS) and application control module.

If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues.

What do I think about the stability of the solution?

It is stable. There are zero false positive solutions, not like other solutions.

What do I think about the scalability of the solution?

We plan to increase our usage.

How are customer service and technical support?

They have a strong technical support.

Which solution did I use previously and why did I switch?

Before FireEye, we used McAfee Endpoint Protection and Trend Micro.

How was the initial setup?

The setup was straightforward.

Our deployment and implementation strategies have to remain agile. Every customer requirement is different. Some implementations require a direct connection and so it will take, for SMB customers, a day more or less. For larger enterprises according to the distribution and the need for more trenches with lots of internet gateways, it could take up to five days. E.g., the deployment could take two to three days with 500 users.

What about the implementation team?

Our technical team does the implementation.

We require two to three people for deployment and maintenance.

What's my experience with pricing, setup cost, and licensing?

The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before.

It is a yearly subscription-based product, which includes the license and hardware. There is also a subscription for technical support up to five years.

It is inexpensive with a competitive price.

Which other solutions did I evaluate?

We also looked at Palo Alto Networks Traps and Trend Micro.

What other advice do I have?

It offers protection from the latest threats.

Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor.
PeerSpot user
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
Real User
A simple to use, yet effective solution for protecting us against malware and other threats
Pros and Cons
  • "The most valuable feature of this solution is its simplicity."
  • "The integration and display of the dashboards have to be done better."

What is our primary use case?

We use this solution to enhance our internal defense system, protecting us against malware and advanced persistent threats.

We use the on-premises deployment model.

How has it helped my organization?

This solution has helped to protect our organization against security threats.

What is most valuable?

The most valuable feature of this solution is its simplicity. The triage process is quite effective, and it is compatible with many different systems.

What needs improvement?

We had a very large problem that has, unfortunately, not been solved. Simply put, when we start the computer the program will not start. We have encouraged FireEye to solve this problem because we have to manually start this product each and every time, and it affects almost thirty percent of our environment. From a security perspective, this is not stable.

After using various components in this solution, I get the feeling that not every part of the whole FireEye suite works perfectly with the other parts. Sometimes you have this functionality where the product has the ability to take data from one part of the solution and use it in different parts. Sometimes, however, you don't have this luxury. The solution needs more suitable dashboards that handle things from different perspectives. For example, a CEO and a technician from operations are completely different. The integration and display of the dashboards have to be done better.

For how long have I used the solution?

We have been using this solution for less than two years.

What do I think about the stability of the solution?

We have had trouble with stability because the program fails to start when the computer does. 

What do I think about the scalability of the solution?

This solution is very flexible and scalable.

How are customer service and technical support?

This solution needs stronger support in Eastern Europe because of the time difference between, for example, Poland and the United States. It makes it difficult to contact technical support. In order to receive good support, we have to wait until 5:00 pm before we call. Essentially, the vender needs a better presence in more time zones, and 24/7 support would help to fix this.

Technical support has another problem, where the support from the US is better than the support elsewhere. The training and knowledge should be the same, no matter which tech support group you contact. This might be accomplished using a better internal knowledge sharing system.

Which solution did I use previously and why did I switch?

We did use another solution prior to this, but because we have the entire FireEye suite, we decided to create a more monolithic approach to security using different products. These include FireEye EX and FireEye AX, which are used for malware protection, network protection, and sandboxing. We decided that if these were good enough then we would push more for the endpoints, which is why we adopted this solution.

How was the initial setup?

The installation of this solution is straightforward from my perspective.

What other advice do I have?

I like FireEye products, and they have a huge portfolio for this solution. However, this is not a magic bullet where you can install it and your problems will disappear. The problem is with the people, rather than the tool. From my perspective, you can install every tool, but you need to have a security operations team involved in the process of analyzing, sorting, and eliminating threats.

When we started our project, we had very few people and we have realized that this had to change. The system without human intervention is useless. We needed to build more complex security operation centers to handle false positives, the triage process, and eliminating threats.

The biggest lesson that I have learned from this solution is that people need to be ready and the business needs to be ready to use it. This is not a toy. It is a very mature solution to protect the internals of the organization and it should be treated in this way.

This is not the worse product that I have seen. I've seen many, many bad products. At the same time, this is not the best product that I have seen.

I would rate this solution an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros sharing their opinions.
Updated: July 2025
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros sharing their opinions.