McAfee Endpoint Protection Essential is a multi-featured security suite, designed for the needs of small and midsize businesses (SMBs) with up to 250 devices.
This system offers businesses a wide array of functionality. A firewall helps keep hackers out of company networks, while anti-malware protection, device control and Web security all defend against multiple security threats.
McAfee Endpoint Protection Essential also features an access protection tool that, in the event of a cyber attack, restricts access to folders designated as “confidential.”
It comes with a central control panel, available on-premise or in the cloud, which enables a single administrator to manage and monitor the company network, making sure company security is up-to-date.
McAfee, a subsidiary of Intel, has clients ranging from government agencies to at-home users. Small business security solutions have been part of its portfolio for over 25 years.
Michael from Thriveworks
Employees number: 51-200 employees
When you think of PC security Software, you think of McAfee. It's reliable and is a proven leader. You get all the security scans and alerts that you'd expect from a security software. McAfee alerts you the minute it suspects a security threat on your computer. They constantly update the product to ensure that you have up to date protection. It's easy to install and is often already installed on your PC when you purchase it. I liked knowing that it was working even when I wasn't thinking about potential risks.
Excellent track record
Proven leader in security software.
Somewhat pricey when you consider some competitors who offer comparable security for less, or even for free.
Annie from Axtria
Full encryption to prevent data theft from stolen laptops or mobile devices. It offers two versions - business and enterprise with enterprise version excluding data encryption feature. This gives flexibility to enterprises already having other tools to encrypt the storage devices and save on some costs.
There is no way to completely wipe off the data from stolen devices. It only encrypts the data. Also, it does not check for outdated softwares which may pose a potential threat.
Complete endpoint protection especially for companies requiring strict data compliance. If data compliance is not a primary requirement, then one might want to look for other solutions.