See our complete list of top 10 enterprise encryption solutions.
Founded in 1987 as McAfee Associates, it became Network Associates in 1997 as a merger of McAfee Associates, Network General, PGP Corporation and Helix Software. In 2004, the company changed its name back to McAfee to reflect its focus on security-related technologies. McAfee was acquired by, and was a wholly owned subsidiary of, Intel from 2011 through 2017. In April 2017, McAfee returned to being a standalone security company. Currently, it is a joint venture between Intel and TPG Capital. It continues to be profitable.
McAfee Complete Data Protection comprises data loss prevention, full-disk encryption, device control, and protection for cloud storage as part of an integrated suite. It supports Apple FileVault on Mac OS X and Microsoft BitLocker on business versions of Windows. As well as disk encryption, it can address system encryption drives, removable media, file shares, and cloud data. Centralized policy management is provided by the McAfee ePolicy Orchestrator (McAfee ePO) management console. This provides remote access to Intel vPro-based PCs so you can implement patches and reset passwords. Strong access control is built in via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, USB drives and CD/DVDs.
Agents are used.
Markets and Use Cases
Due to a large installed base, McAfee plays in most verticals and ranges from SMB to enterprise.
Can scale up to very large numbers of endpoints.
FIPS 140-2 and Common Criteria EAL2+ certified and accelerated with the Intel Advanced
Encryption Standard-New Instructions (Intel AES-NI) set.
It offers remote command execution options to interact with orchestration and security systems via 3rd party system that allows scripting (CLI, URL or API). ePO Tagging sends McAfee Agent wakeup calls which allow automated task and policy changes.
Software and agents.
McAfee tends to price its enterprise endpoint products on a per-node basis.
Get the Free Cybersecurity Newsletter
Strengthen your organization’s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices.