Browse Software
List Your Product
Loading...
Endpoint Protector logo

Endpoint Protector

  Add to Compare

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

McAfee Complete Data Protection logo
View Details

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Check Point DLP logo
View Details

Overview

Description McAfee Complete Data Protection secures critical data on endpoints with encryption. Monitor real-time events and generate detailed reports that show auditors and senior management compliance with internal and regulatory privacy requirements. Establish and enforce data protection policies while centralizing data security management. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive. Read more Check Point DLP is a data loss prevention software that protects companies from unintentional loss of sensitive and valuable information. The software can be used to control and track any format or type of sensitive information in motion, such as web browsing, e-mail and file-sharing services. Check Point DLP alerts and educates end-users on proper data handling and remediation processes without making the IT/security teams get involved. The software also allows users to manage their entire IT infrastructure from a central location without much of a hassle. It enables companies to prevent data loss incidents by simply notifying users about potential data sharing tasks. With an inbuilt 360° visibility and reporting schedule, the software helps companies to monitor and detect data loss security incidents in an efficient manner. At last, Check Point DLP also allows users to choose from over 500+ (DLP) or 60+ (Content Awareness) predefined data types in order to categorise the entire data. Read more
Pricing Options
  • Free Trial Available
  • Offers Custom plan.
  • Free Trial Available
  • Offers Custom plan.
SW Score & Breakdown

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    73%
  • Reviews
    97%
  • Momentum
    60%
  • Popularity
    63%

77% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    76%
  • Momentum
    62%
  • Popularity
    63%

Features

Total Features
4 Features
4 Features
Common Features for All
    Blacklisting The practice of blocking identified entities to access particular privilege and services
    Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
    Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
    File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
    Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
    Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
    Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
  • + 1 More - Show Less
    • Blacklisting The practice of blocking identified entities to access particular privilege and services
      Compliance Reporting Helps in creating a compliance report to establish an effective and efficient policy and procedure management.
      Data Leak Detection Helps to prevent and mitigate data leaks through endpoints
      File Server Auditing Records and reports all file accesses and modifications made to file servers in the real-time environment.
      Incident Management Helps in identifying, analyzing and rectifying a bad incident or issues to ensure it does not reoccur in future
      Policy Management Helps to design, maintain, update and report on compliance rules, regulations and policy status electronically so that it is easily accessible
      Sensitive Data Identification Inspects the sensitive data (PII, PCI, PHI) in file contents and classifies the files, folders, and data based on vulnerability
  • + 1 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Online
    • 24/7 (Live rep)
    • Online

    Reviews & Ratings

    User Rating
    4.2/5 69 user ratings
    4.7/5 14 user ratings
    Rating Distribution
    • Excellent

      52.2%
    • Very Good

      24.6%
    • Average

      18.8%
    • Poor

      2.9%
    • Terrible

      1.4%
    • Excellent

      71.4%
    • Very Good

      28.6%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Offers Custom plan.
    • Free Trial Available
    • Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    McAfee Complete Data Protection Custom

    McAfee Complete Data Protection Advanced Custom

    Check Point Data Loss Prevention Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Videos Not Available Video Thumbnail

    Vendor information

    Company Details Located in: Santa Clara, California Located in: San Carlos, California
    Contact Details

    1-888-847-8766

    https://www.mcafee.com/enterprise/en-us/products/complete-data-protection.html

    1-800-429-4391

    https://www.checkpoint.com/products/data-loss-prevention/

    Social Media Handles

    Not available

    Not available

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed