McAffee Endpoint Protection-logo

McAffee Endpoint Protection - Security

(23)
  • Deployment:
  • Company Size:SML
  • Features:
  • Platforms:
  • Pricing:

Details

McAfee Complete Endpoint Protection—Business by Intel is an on-premise endpoint security solution for businesses of all sizes. It offers anti-malware protection, mobile security, data loss prevention, intrusion detection and prevention and web and email security within a suite. McAfee Endpoint Protection Advanced is a hybrid security suite for small and midsize businesses (SMBs) that offers them security functionalities such as a firewall to prevent hackers from accessing company networks, anti-malware protection and web security to protect against malicious URLs and other online threats. It can be either deployed on-premise or hosted in the cloud. McAfee Endpoint Protection Essential is a multi-featured security suite, designed for small and midsize businesses (SMBs).

Features

Pricing Model
  • Monthly subscription per user
  • Yearly subscription per user
  • Metered per minute
  • Monthly site license
  • Yearly site license
  • Flat fee
  • Monthly subscription
  • Percentage-based (% of collections or claims)
  • Fee-based (fixed $/claim)
  • Hybrid (combination of % and fixed amount/claim)
Target Company Size
  • Startup
  • Small-to-Medium Business
  • Enterprise
Service Terms Offered
  • Commitment Free
  • Free Setup
  • Free Cancellation
  • Money Back Guarantee
  • Month-to-Month Option
  • Keep Original Number
  • Customizable Plans
  • Free In-Network Calls
  • Unlimited Minutes
  • International Calls
  • Reduced Price for Multiple Users
  • Account Manager
Mobile Apps Offered
  • None
  • iOS
  • Android
Support Features
  • FAQs Section
  • Tutorials
  • Telephone Support
  • Email Support
  • 24/7 Support
  • Online Chat
  • Forum
  • In-Person Training
  • Social Media
  • Knowledge Base
  • Webinars
Compatible Operating System(s)
  • Windows
  • iOS
  • Linux
  • Mac
  • Android
Deployment
  • Hosted/Cloud
  • On-Premise
  • Mobile
Mobile friendly?
  • Yes
  • No
Price
  • 1 - Inexpensive
  • 2
  • 3 - Moderate
  • 4
  • 5 - Expensive
Features
  • 1 - Limited features
  • 2
  • 3 - Moderate
  • 4
  • 5 - Full featured
Security Features
  • Multi-Factor Authentication
  • Endpoint Security
  • Anti-Virus Protection
  • Malware Protection
  • Single Login
  • App Catalog
  • Unified Directory
  • Adaptive Authentication
  • Mobile Identity
  • Compliance
  • User Provisioning
  • Virtual LDAP
  • Remote Wipe
  • Content Encryption
  • Digital Rights Management
  • Analytics and Reporting
  • Secure Content Storage and Sharing
  • e-Signature
  • Inbound and Outbound Traffic Filtering
  • Data Loss Prevention
  • Device Control
  • eDiscovery
  • Enterprise Mobility Management
  • Whitelists and Blacklists
  • File Tracing and Shadowing
  • Content Filtering
  • Static and Dynamic Attack Protection
  • Dashboards
  • Application Hardening
  • Application Behavior
  • Web Protection
  • Exploit Mitigation
  • Ransomware Mitigation
  • Payload Analysis
  • Policy Management
  • Cloud Protection
  • Network Security
  • Security Management
  • Server Security
  • Data Backup and Recovery
  • Gateway Security
  • Visualization
  • Firewall
  • Sandboxing
  • Spam Blocker
  • Email Protection
  • Security Trend Reporting
  • Password Security Enforcement

Pricing

Request a custom quote for your business

Get Pricing

Recommended Articles

4 Tips for Choosing Security Software Systems That Scale Along with Your Company Growth

Along with business innovation and growth comes the complexity of securing data, systems, and operations. With each i...

3 Reasons Cloud Security is More Important than Ever

Thanks to the availability and affordability of cloud-based infrastructure and business software solutions, the trend...

The Top 3 Companies Pioneering the IaaS Market

Cloud services and infrastructure companies such as AWS, Google Cloud, and Microsoft Azure give you all the tools and...

Anti-Virus Software Won't Protect Your Business

In today’s era of sophisticated hacks and with unprecedented levels of cybercrime and data breaches occurring, ...

4 Ways AI is Redefining Enterprise Security

Artificial Intelligence (AI) isn’t necessarily a new technology, but it’s been perceived more as a work o...

The Most Notorious Cyber Attacks Of the Past Decade

From Yahoo! to NotPetya - so much happened in the cyberspace during the course of these 10 years. Here's a flashback.

How to Protect Your Business from Known Cyber Security Risks

Maintaining tight cybersecurity within your business has some standard protocols - and the right security software is one of them.

Let's Make a Deal: Basic Steps for Switching to Cloud Computing

Moving your business data online doesn't have to be a scary proposition.

5 Steps Toward PCI DSS Compliance

The latest in credit-card protection requires a new approach.

Identity Theft: OpenID and What It Means for Web Security

The new open-source identity initiative is finally kick-starting online-identity standards.

Colocation-Center Security Trends

What are colocation datacenters doing to protect your company's assets?
Loading Reviews..