McAfee Complete Data Protection: Encryption Product Overview and Analysis

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

See our complete list of top 10 enterprise encryption solutions.

Company Description

Founded in 1987 as McAfee Associates, it became Network Associates in 1997 as a merger of McAfee Associates, Network General, PGP Corporation and Helix Software. In 2004, the company changed its name back to McAfee to reflect its focus on security-related technologies. McAfee was acquired by, and was a wholly owned subsidiary of, Intel from 2011 through 2017. In April 2017, McAfee returned to being a standalone security company. Currently, it is a joint venture between Intel and TPG Capital. It continues to be profitable.

Product Description

McAfee Complete Data Protection comprises data loss prevention, full-disk encryption, device control, and protection for cloud storage as part of an integrated suite. It supports Apple FileVault on Mac OS X and Microsoft BitLocker on business versions of Windows. As well as disk encryption, it can address system encryption drives, removable media, file shares, and cloud data. Centralized policy management is provided by the McAfee ePolicy Orchestrator (McAfee ePO) management console. This provides remote access to Intel vPro-based PCs so you can implement patches and reset passwords. Strong access control is built in via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, USB drives and CD/DVDs.


Agents are used.

Markets and Use Cases

Due to a large installed base, McAfee plays in most verticals and ranges from SMB to enterprise.

Applicable Metrics

Can scale up to very large numbers of endpoints.

Security Qualifications

FIPS 140-2 and Common Criteria EAL2+ certified and accelerated with the Intel Advanced

Encryption Standard-New Instructions (Intel AES-NI) set.


It offers remote command execution options to interact with orchestration and security systems via 3rd party system that allows scripting (CLI, URL or API). ePO Tagging sends McAfee Agent wakeup calls which allow automated task and policy changes.


Software and agents.


McAfee tends to price its enterprise endpoint products on a per-node basis.

Get the Free Cybersecurity Newsletter

Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Drew Robb Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis