McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:
Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.
Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.
Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.
Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.
Gain visibility and manage what and how users copy valuable company data to removable media.
Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.
Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.
Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.
The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Alcatel-Lucent Shanghai Bell uses McAfee Network Security Platform to secure 100 Mbps to 10 Gbps corporate networks against threats and attacks.
Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.
Memorial Hermann Healthcare System guards patient data with McAfee Endpoint Encryption and Device Control.
Xinjiang Mobile's comprehensive assessment of data protection products in the market lead them to choose and deploy McAfee’s solution.
Cyber security has become a huge concern for businesses today, with valuable customer and corporate data accessible to determined individuals through a variety of avenues. Today, there are numerous digital and physical security risks posed by users who do not properly erase data before disposing of commonly used office equipment and devices. In order to […]
The post Are You Leaving Your Office Unlocked? Everyday Items Could Be Putting Company Data At Risk appeared first on McAfee.
Update: 4/11/2014 McAfee’s Heartbleed Test tool has been posted and enables users to test sites for the presence of this vulnerability. ———- A recent vulnerability in OpenSSL is causing quite a stir. Documented as CVE-2014-0160, this vulnerability has a significant impact on the perceived security of a number servers across the globe. One of […]
The post ‘Heartbleed’ Vulnerability Opens the Door to SSL Heartbeat Exploits appeared first on McAfee.
In McAfee Labs we keep a close eye on the Zeus/Zbot/Gamover botnet malware that is responsible of thousands of samples we gather each day. The following graph shows the total number of Zbot samples submitted to McAfee Labs in recent months. For a couple of weeks, McAfee Labs has followed a global Zbot campaign, in […]
Try all we might to develop the perfect data protection and management solution, there will always be those that will not avail themselves to it for one reason or another. We keep striving to develop technologies and features that move the needle, but that doesn’t guarantee 100% adoption. But that is okay. We have to […]
The post Does the Saying “If You Build it, They Will Come” Apply to Data Protection? appeared first on McAfee.
Filing your taxes online is convenient but also comes with some potential security problems. My job as an expert in all things online-security is to spell out what these online tax scam risks are and how to avoid them. As you get ready to file your taxes this year, here are some things you should […]