McAfee Device Control

McAfee Device Control

Prevent unauthorized use of removable media

Overview

McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:

Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.

Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.

Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.

Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.

Features & Benefits

Protect your business from data loss

Gain visibility and manage what and how users copy valuable company data to removable media.

Maintain control over your confidential data

Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.

Enable productivity while ensuring data protection

Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.

Centralize and simplify your security management

Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.

Prove compliance with less effort

Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.

System Requirements

The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Server 2003 Service Pack 1 (SP1), 2003 R2
  • Hardware requirements
    • CPU: Pentium II-class or higher, 450 MHz minimum
    • RAM: 512 MB (1 GB recommended)
    • Disk space: 250 MB

Device Control Endpoint

  • Operating systems
    • Microsoft Windows XP Professional with SP1 or higher
    • Microsoft Windows 2000 SP4 or higher
  • Hardware requirements
    • CPU: Pentium III, 1 GHz or faster
    • RAM: 512 MB, 1 GB (recommended)
    • Disk space: 200 MB minimum
    • Network connection: TCP/IP for remote access

Customer Stories

CSTISA

This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.

Highlights
  • Supports year-over-year scalability and business continuity
  • Helps build trust as an IT security advisor to customers
  • Provides expert service to customers, from sales and installation through ongoing support
  • Allows expansion into new markets, such as cloud security services

GAD eG

This provider of banking IT services centralizes security management and improves security throughout its endpoints, including ATMs and point-of service systems in branches.

Informa

Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.

Highlights
  • Gained fast ROI through solid protection, reasonable pricing, and reduced internal costs
  • Created an environment of easy deployment and administration
  • Protected against malware with augmented malware detection abilities
  • Assured that the entire network is protected
  • Increased control over the security infrastructure

Resources

Brochures

Encrypted Drives

McAfee provides thumb drives and hard disks that meet Department of Defense requirements.

Data Sheets

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • RSA Conference 2015: Shaking Up Security
    McAfee Enterprise - April 14, 2015

    With RSA Conference drawing near, the information security industry is abuzz. In today’s digital, always-on (rather, always-online) world, it is more critical than ever to keep data protection top of mind. RSA Conference provides an open forum for security professionals to do just that, from learning the latest industry trends to exchanging ideas on how […]

    The post RSA Conference 2015: Shaking Up Security appeared first on McAfee.

  • Do you have a mobile wallet?
    Cybermum Australia - April 13, 2015

    We recently had a credit card fraud situation in our house. Not only was it very concerning but very time consuming. It literally took hours: cancelling payments and then re-establishing them again with the gym, the schools and array of transport cards. And the worst thing – having to wait until the new cards arrived […]

    The post Do you have a mobile wallet? appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Millions of customers’ data up for sale as RadioShack goes out of business
    Gary Davis - March 26, 2015

    When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]

    The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.

  • Shifting the Focus: Cybersecurity as an Enabler
    Tom Gann - March 25, 2015

    For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches.  While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]

    The post Shifting the Focus: Cybersecurity as an Enabler appeared first on McAfee.