SHARE
Facebook X Pinterest WhatsApp

McAfee Complete Data Protection: Encryption Product Overview and Analysis

See our complete list of top 10 enterprise encryption solutions. Company Description Founded in 1987 as McAfee Associates, it became Network Associates in 1997 as a merger of McAfee Associates, Network General, PGP Corporation and Helix Software. In 2004, the company changed its name back to McAfee to reflect its focus on security-related technologies. McAfee […]

Written By
thumbnail Drew Robb
Drew Robb
Aug 15, 2017
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

See our complete list of top 10 enterprise encryption solutions.

Company Description

Founded in 1987 as McAfee Associates, it became Network Associates in 1997 as a merger of McAfee Associates, Network General, PGP Corporation and Helix Software. In 2004, the company changed its name back to McAfee to reflect its focus on security-related technologies. McAfee was acquired by, and was a wholly owned subsidiary of, Intel from 2011 through 2017. In April 2017, McAfee returned to being a standalone security company. Currently, it is a joint venture between Intel and TPG Capital. It continues to be profitable.

Product Description

McAfee Complete Data Protection comprises data loss prevention, full-disk encryption, device control, and protection for cloud storage as part of an integrated suite. It supports Apple FileVault on Mac OS X and Microsoft BitLocker on business versions of Windows. As well as disk encryption, it can address system encryption drives, removable media, file shares, and cloud data. Centralized policy management is provided by the McAfee ePolicy Orchestrator (McAfee ePO) management console. This provides remote access to Intel vPro-based PCs so you can implement patches and reset passwords. Strong access control is built in via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, USB drives and CD/DVDs.

Agents

Agents are used.

Markets and Use Cases

Due to a large installed base, McAfee plays in most verticals and ranges from SMB to enterprise.

Applicable Metrics

Can scale up to very large numbers of endpoints.

Security Qualifications

FIPS 140-2 and Common Criteria EAL2+ certified and accelerated with the Intel Advanced

Encryption Standard-New Instructions (Intel AES-NI) set.

Intelligence

It offers remote command execution options to interact with orchestration and security systems via 3rd party system that allows scripting (CLI, URL or API). ePO Tagging sends McAfee Agent wakeup calls which allow automated task and policy changes.

Delivery

Software and agents.

Pricing

McAfee tends to price its enterprise endpoint products on a per-node basis.

thumbnail Drew Robb

Originally from Scotland, Drew Robb has been a writer for more than 25 years. He lives in Florida and specializes in IT, engineering, and business. As well as eWeek and TechRepublic, he writes for a wide range of magazines including Gas Turbine World, SDxCentral, and HR Magazine. He is the author of Server Disk Management in a Windows Environment (Auerbach Publications).

Recommended for you...

Proxy vs VPN: Which One Do You Really Need?
Matt Gonzales
Sep 24, 2025
5 AWS Security Tools Every Team Should Know
Matt Gonzales
Sep 24, 2025
The 6 Best Email Security Software & Solutions (Compared and Reviewed)
Matt Gonzales
Sep 24, 2025
5 Best Free VPNs You Can Trust (And the Premium Trials Worth Trying)
Matt Gonzales
Sep 4, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.