McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:
Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.
Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.
Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.
Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.
Gain visibility and manage what and how users copy valuable company data to removable media.
Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.
Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.
Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.
The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.
Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.
In today’s digital computing world there is a device and application for almost everything we do. I wake up in the morning to the sound of an alarm that was set on my smart phone. I then take a glimpse into my day and check emails, calendars and the weather. Minutes later, I text my […]
The post To Make Security Work for Work, Companies Need to Invest in Automatic Solutions appeared first on McAfee.
Every dog has its day, and for data privacy that day is January 28, 2015. What the average person may consider just another Wednesday is an important day for those of us in the cybersecurity community. Data Privacy Day is the perfect reminder of the need to educate and safeguard both businesses and consumers alike. And […]
The post Data Privacy Day: Making the World a Safer Place Through Education appeared first on McAfee.
It’s fair to say that 2014 was the year of the data breach with frequent high-profile incidents compromising personal customer information and credit card details. That’s backed up by PwC’s Global State of Information Security survey of almost 10,000 business and IT executives, which shows the number of incidents detected up 48 per cent on […]
The post Can your organisation detect and report a data breach within 72 hours? appeared first on McAfee.
In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and executable files. Recently we have seen a similar infection method that attacks PDF, MSI (Windows installer), and executables, though the current malware is not as complex as XDocCrypt. W32/PDFCrypt is not complex. The coding standards, propagation methods, stealth […]
This is part I in a series on proactive defense using a proven professional services security methodology When my credit card got declined at the gas station I remembered a term I’d recently read in an article about a large retailer’s data breach. The term is “vulnerability-fatigue,” where news of a recent disaster is ignored […]
The post Defending Against a ‘New Normal’ through Relevance appeared first on McAfee.