The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console. This advanced suite features data loss prevention, device control, and optionally, management of native encryption for Apple FileVault native to Macs and Microsoft BitLocker management for Windows PCs*. Additionally, McAfee ePO Deep Command provides remote security management to access Intel vPro-based PCs to implement patches, reset passwords, and to remediate broken endpoints.
The McAfee Complete Data Protection — Advanced suite helps:
McAfee Complete Data Protection — Advanced is the full data protection suite that includes DLP Endpoint, Device Control, drive encryption, file and removable media protection, management of native encryption and ePO Deep Command.
*Other names and brands may be claimed as the property of others.
Monitor and regulate how your employees access, use, and transfer data via common channels, such as email, IM, printing, and USB drives — both in and away from the office.
Prevent unauthorized system access and render sensitive data unreadable in the event of device loss or theft by implementing full-disk encryption and access control on all endpoint devices. Encryption options include enterprise-grade drive encryption or management of native encryption for Apple FileVault and Microsoft BitLocker management.
Automatically and transparently encrypt files and folders on the fly — before they move through and outside your organization.
By communicating with endpoints at a level beyond the operating system, ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.
Use a single, centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce mandatory, company-wide security policies that control how data is encrypted, monitored, and protected from loss. Centrally define, deploy, manage, and update data security policies that encrypt, filter, monitor, and block unauthorized access to confidential data.
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.
McAfee endpoint encryption solutions integrate industry-leading technologies to provide top performance, advanced data protection, and seamless deployment for Microsoft Windows and Apple Mac endpoints. Learn more about each of these technologies below:
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
State Government Places its Trust in Intel Security for IT Consolidation Within this US state government, the Office of Technology is the central IT organization, serving almost 400 executive, judicial, and legislative agencies, which, in turn, administer programs for 4.4 million citizens. The Office of Technology oversees a network linking 1,500 locations and 35,000 users across the state.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.
With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Help stop data loss while maintaining user productivity.
McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.
All-inclusive drive support fuels both the performance of hardware-based encryption and the flexibility of software-based encryption.
Learn how hardware-enhanced solutions from Intel and McAfee help you protect and manage remote PCs and data.
Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.
Learn how McAfee Endpoint Encryption prevents data loss with comprehensive protection for a wide range of endpoints and robust, centralized management.
This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.
McAfee Drive Encryption provides a hybrid agent that can automatically and transparently detect whether software- or hardware-based encryption is needed.
This paper highlights how integrated hardware-software solutions from Intel and McAfee help you keep remote PCs and data safer with accelerated encryption and secure remote access to PCs powered by Intel Core vPro processors.
This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.
This post was written with the invaluable assistance of my colleague Rakesh Sharma. Over the past couple of months McAfee Labs has seen an increase in the usage of macros to deliver malware. This kind of malware, as mentioned in previous posts (Dridex, Bartallex), usually arrives as an attached document within a phishing email. Recently […]
Intel Security today released the McAfee Labs Threats Report: May 2015. Along with the usual compilation of threats statistics, it focuses on three key topics: A surge in powerful and clever ransomware that encrypts files and holds them hostage until the ransom is paid. New Adobe Flash exploits target the growing number of vulnerabilities that […]
The post McAfee Labs Threats Report Highlights Surge in Ransomware, Flash Exploits, Firmware Attacks appeared first on McAfee.
Take the time to detect the attack, isolate the infected machines, and restore them to a known state. Are you one of the lucky 12%? That is how few companies we surveyed did not experience a successful targeted cyberattack in 2014. If you are one of the few, and think your luck is going to […]
The post What Are You Doing During The Golden Hour After An Attack? appeared first on McAfee.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]