How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use it, for example, for USB devices. When we are using USB devices, we have to put the password to open the USB stick. Without it, we cannot use the USB stick anywhere.
We are a solution provider and this is one of the security products that we implement for our clients. I focus primarily on data protection and data loss prevention solutions, and in this role, I work with McAfee Complete Data Protection a lot. We also use it for encryption. A simple use case would be keywords and reject detection. Other reasons that we use it are for PII and PCI compliance.
The main use case of this solution is identifying bad actors (criminals) who want to steal data and locking them out of areas that require authentication.
We are system integrators who do the implementation and provide support for a variety of products. One of our main areas of focus is endpoint security, along with data loss prevention, encryption, and web security. McAfee Complete Data Protection is one of the security solutions that we implement for our customers. It is the best match for GDPR compliance.
I am actually very familiar with the on-premises solution. I am just starting to try out the cloud version. I have not really had the opportunity to exercise the capabilities fully because I need to buy the license to do that. I work with Cyber Security Africa Distribution, but even being that type of organization we still have to purchase our license to try the full solution. I have seen it work with the MVISION Cloud, but I have not tried out the data protection path. But I have reviewed all the features.
Some users were concerned about their employees' information. They needed to protect this data from leakage and from any type of exploitation. Therefore, the DLP was deployed in their environment to protect them and to test the actual requirements. This is why we primarily use the solution.
We primarily use this solution for folder and disk encryption. One encrypted folder in Drive D: for each PC user and disk encryption for all notebook PCs, especially for sensitive or confidential data.
We deploy McAfee products mostly as service delivery providers for our customers. About 60% to 70% of the time we use this solution as the complete, modular anti-virus component for data and endpoint protection. We use the advanced version for device control. Sometimes we integrate Endpoint Encryption for file and folder protection and maybe add in McAfee Application Control to block unwanted applications. We provide services for prevention as well as endpoint and firewall solutions. Depending on what the client wants, there are many of the McAfee modules in this line that we work with to provide an integrated solution. Unfortunately, we are not using McAfee in our company because there are policies that come from our main offices in India rather than here in the UAE. That is the only reason we are using another solution. But for my own purposes, this is the solution I have chosen to use in my home. Our customers are mainly medium-sized organizations although we have some enterprise clients. When I say enterprise, I mean companies that have more than 1000 machines. I have very big clients that have more than 2,000 end-users and they are using this product.
We primarily use the solution for endpoint protection, data loss prevention and application whitelisting.
This solution helps us to protect and secure our data.
I use this solution to protect my notebook. This is an on-premise deployment that was installed by my company on my notebook.
The primary use case is to protect the database from privileged use, weak authentication, database exposure, SQL injection, and database platform vulnerability. This product answered those five and more. I found ways to add more rules within the product, to a different area in the database, which helps me use the product in addition as a kind of DLP solution. If one of the users makes heavy requests from the database, and take exception reports, I get an alarm, or I can automatically block those transactions.