McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:
Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.
Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.
Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.
Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.
Gain visibility and manage what and how users copy valuable company data to removable media.
Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.
Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.
Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.
The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Alcatel-Lucent Shanghai Bell uses McAfee Network Security Platform to secure 100 Mbps to 10 Gbps corporate networks against threats and attacks.
Informa used McAfee to centralize and standardize its security infrastructure to better protect against viruses, spyware, spam, pop-ups, and more.
Memorial Hermann Healthcare System guards patient data with McAfee Endpoint Encryption and Device Control.
Xinjiang Mobile's comprehensive assessment of data protection products in the market lead them to choose and deploy McAfee’s solution.
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector. We have found that in a group of popular retail apps, such as Costco’s and Walgreens’ apps for Android, when a QR code is scanned using the […]
The post ZebrAttack Creates Data Breach via Mobile OS, App Vulnerabilities appeared first on McAfee.
A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should address in a couple of blogs; (1) what should people look for when selecting an encryption solution, and (2) how do those encryption […]
The post More Choices for Encryption to Protect Your Data-At-Rest appeared first on McAfee.
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and demands payment to free the […]
Retailers all over the world lose sleep over data breaches—and CSOs and IT security managers work hard to make sure that cyber thieves stay out of their endpoints and networks. They are layering on more anti-malware solutions, tighter defenses at email and web gateways, stronger next-generation firewalls, and more efficient intrusion prevention systems. But with […]
The post No Exit: How to Keep Data from Escaping via POS Systems appeared first on McAfee.
Targeted email attacks, often known as spear phishing, are one of the most prevalent threats to businesses today. The nature of these attacks makes them difficult to detect – many are sent to just to one or a handful of contacts in a chosen company. Even more so, the emails themselves are often so convincing […]