McAfee Device Control

McAfee Device Control

Prevent unauthorized use of removable media

Overview

McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:

Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.

Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.

Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.

Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.

Features & Benefits

Protect your business from data loss

Gain visibility and manage what and how users copy valuable company data to removable media.

Maintain control over your confidential data

Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.

Enable productivity while ensuring data protection

Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.

Centralize and simplify your security management

Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.

Prove compliance with less effort

Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.

System Requirements

The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Server 2003 Service Pack 1 (SP1), 2003 R2
  • Hardware requirements
    • CPU: Pentium II-class or higher, 450 MHz minimum
    • RAM: 512 MB (1 GB recommended)
    • Disk space: 250 MB

Device Control Endpoint

  • Operating systems
    • Microsoft Windows XP Professional with SP1 or higher
    • Microsoft Windows 2000 SP4 or higher
  • Hardware requirements
    • CPU: Pentium III, 1 GHz or faster
    • RAM: 512 MB, 1 GB (recommended)
    • Disk space: 200 MB minimum
    • Network connection: TCP/IP for remote access

Resources

Brochures

Encrypted Drives

McAfee provides thumb drives and hard disks that meet Department of Defense requirements.

Data Sheets

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • What is the Cloud?
    Robert Siciliano - May 25, 2015

    You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

    The post What is the Cloud? appeared first on McAfee.

  • Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool
    Umesh Wanve - May 19, 2015

    Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]

    The post Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Teach Your Mom to be a Sure & Safe Netizen
    Anindita Mishra - May 10, 2015

    Mother’s Day Role Reversal for Young Techies Remember those times when you frowned and squinted, tongue held between your teeth, as your mom guided your little hand over the cursive letters? Remember how she patiently spent hours teaching you the alphabets and numbers? This Mother’s Day, acknowledge her extraordinary contribution in creating a literate you […]

    The post Teach Your Mom to be a Sure & Safe Netizen appeared first on McAfee.