McAfee’s comprehensive data protection solutions support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data.
McAfee enables compliance with Office of Management and Budget (OMB) directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections (TIC), and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the data governance standards of the National Association of State Chief Information Officers (NASCIO). With our global coverage, we can work with you in-country or in-region to address the regulatory and privacy concerns that matter the most to your agency or department.
McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media so your data stays protected under company control.
McAfee Complete Data Protection delivers powerful encryption, preventing unauthorized access to sensitive data, and stopping data loss and exposure. McAfee offers multiple layers of encryption solutions for your PC, network files and folders, mobile devices, virtual disks, removable media, and encrypted USB devices.
McAfee Complete Data Protection — Advanced offers strong encryption, authentication, data loss prevention, and policy-driven security controls to help block unauthorized access to your sensitive information — anytime, anywhere.
McAfee Network User Behavior Analysis delivers real-time visibility into what users are doing on your network and how they are using critical business applications. This intuitive view provides the decision support information you need to reduce risk and meet compliance requirements. Automated monitoring, based on packet capture, as well as analysis and instant correlation to security policy, dramatically increases accuracy and reduces the time and effort required to detect behavioral anomalies.
McAfee Policy Auditor automates data gathering and assessment processes required for internal and external system-level IT audits.
McAfee Risk Advisor saves you time and money by proactively correlating threat, vulnerability, and countermeasure information to pinpoint at-risk assets and optimize patching efforts.
McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.
Evaluate the security of your cloud-based solution. McAfee Foundstone’s Cloud Computing Security Assessment eases the transition to cloud-based services and assures your customers and business partners that your cloud solution is secure.
Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Foundstone reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.
Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.
Explore McAfee solutions that protect data on removable media devices.
This guide includes available features and specifications for the complete range of McAfee Encrypted USB devices.
This business brief discusses privacy-enabling technologies, effective data governance, and security management.
McAfee works closely with a partner, TITUS, to provide resilient data governance solutions that enable government customers to meet regulatory requirements, prevent sensitive data leakage, monitor user compliance, and respond quickly to security incidents.
This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.
Review the security implications of in-the-cloud services and get an overview of best practices to protect cloud-based solutions. This white paper also examines McAfee solutions that protect cloud-based software, as well McAfee's cost-effective software-as-service products that require no additional hardware installation.
This week, President Obama released his annual draft budget for Fiscal Year 2015. The budget calls for reductions in defense, leaving the physical U.S. military at is smallest level since WWII. At the same time, spending levels for cybersecurity could be increasing – or at least they won’t be declining. This reflects a strategic realignment […]
The post Cybersecurity Emphasized in the President’s Budget appeared first on McAfee.
This week, the city of San Francisco is hosting one of the biggest cybersecurity events of the year – the RSA conference. The meeting draws hundreds of prominent cyber exhibitors and thousands of guests, spurring a discussion on the cyberthreat landscape and the solutions companies are employing to keep us safe from bad actors on […]
McAfee’s annual FOCUS security conference usually showcases some great new product offerings, and this year they’re especially compelling. The first is an end-to-end threat protection solution to combat advanced malware. It’s dubbed Find, Freeze and Fix, and it leaves the single-feature, static analysis sandboxing products in the dust. This comprehensive solution addresses all three requirements […]
The post Two FOCUSed Products that make Security Connected Real appeared first on McAfee.
Friends and colleagues: As I transition from McAfee’s Public Sector CTO to my new role as Deputy Under Secretary, Cyber Security, National Protection and Programs Directorate at the U.S. Department of Homeland Security, please accept my gratitude for your support, humor and all that I have learned from you. My new position will be a […]
This is a bittersweet moment for me. McAfee is losing a tremendous talent as Dr. Phyllis Schneck heads to the Department of Homeland Security to take on a critical leadership role in cyber security policy. But our loss is the Department’s gain, and we’re proud to be adding such an excellent resource to the government’s […]
The post Saying Goodbye to Dr. Schneck: With a Heavy Heart, but with Great Anticipation appeared first on McAfee.