McAfee Complete Endpoint Protection—Business is a comprehensive, multi-featured endpoint security solution, designed to defend businesses against today’s toughest and stealthiest threats.
Targeted at businesses with 1,000 nodes or less, McAfee Complete Endpoint Protection—Business offers firms a wide array of functionality, including anti-malware protection, mobile security, data loss prevention, intrusion detection and prevention and Web and email security.
McAfee Complete Endpoint Protection—Business allows users to unify management across all their endpoints, ranging from from virtual machines and servers to PCs and mobile devices. Businesses can act in real time to fix vulnerabilities and stop threats in their tracks, and to secure confidential data on all devices and removable media while sharing files securely.
McAfee, a wholly-owned subsidiary of Intel, has long and wide-ranging experience providing customers of every sort with IT security. Clients range from government agencies to millions of at-home users; business sizes range from the smallest startups to the largest enterprises.
Michael from Thriveworks
Employees number: 51-200 employees
When you think of PC security Software, you think of McAfee. It's reliable and is a proven leader. You get all the security scans and alerts that you'd expect from a security software. McAfee alerts you the minute it suspects a security threat on your computer. They constantly update the product to ensure that you have up to date protection. It's easy to install and is often already installed on your PC when you purchase it. I liked knowing that it was working even when I wasn't thinking about potential risks.
Excellent track record
Proven leader in security software.
Somewhat pricey when you consider some competitors who offer comparable security for less, or even for free.
Annie from Axtria
Full encryption to prevent data theft from stolen laptops or mobile devices. It offers two versions - business and enterprise with enterprise version excluding data encryption feature. This gives flexibility to enterprises already having other tools to encrypt the storage devices and save on some costs.
There is no way to completely wipe off the data from stolen devices. It only encrypts the data. Also, it does not check for outdated softwares which may pose a potential threat.
Complete endpoint protection especially for companies requiring strict data compliance. If data compliance is not a primary requirement, then one might want to look for other solutions.