McAfee Complete Data Protection

McAfee Complete Data Protection

Soluzione completa di crittografia per gli endpoint

Agisci:
  • Contatta McAfee
    Pronto a fare un acquisto o vuoi chiarire dei dubbi prima di acquistare? Contatta un esperto McAfee. Disponibile dal lunedì al venerdì. Disponibile solo in inglese.
  • Trova un rivenditore
  • Contattaci
  • Telefonare: 00800 122 55624

Panoramica

La suite McAfee Complete Data Protection protegge i tuoi dati combinando il controllo degli accessi a una solida crittografia degli endpoint da grande azienda. Aiuta a definire e imporre una policy di protezione dei dati e ne centralizza la gestione con l'utilizzo della console di gestione McAfee ePolicy Orchestrator (ePO). Questa suite include la gestione della crittografia nativa per Apple FileVault su Mac e per Microsoft BitLocker nei PC Windows*. Inoltre McAfee ePO Deep Command fornisce la gestione remota della sicurezza per accedere ai PC basati su Intel vPro e applicare le patch, reimpostare le password e correggere gli endpoint compromessi.

La suite McAfee Complete Data Protection aiuta a:

  • Proteggere i dati da perdite o furti con una soluzione rapidissima di crittografia degli endpoint che è certificata FIPS 140-2 e Common Criteria EAL2+ e accelerata da Intel Advanced Encryption Standard New Instructions (Intel AES-NI).
  • Crittografare l'archiviazione in computer desktop, postazioni dell'infrastruttura desktop virtuale, laptop, tablet e dispositivi removibili quali CD/DVD e flash USB. Tu decidi quali specifici tipi di file e cartelle crittografare.
  • Utilizzare la gestione della cifratura nativa per Mac con Apple FileVault e per Windows PC con Microsoft BitLocker.
  • Estendere la portata dell'IT con le piattaforme basate su Intel vPro e Intel Active Management Technology per l'accesso remoto sicuro, anche ai PC spenti o crittografati.
  • Eseguire in tutta tranquillità la distribuzione e configurazione tramite l'utilità Endpoint Encryption Go, in modo che i tuoi endpoint superino le ispezioni pre-crittografia e il monitoraggio continuo dello stato.
  • Utilizzare le funzioni di verifica e reportistica avanzate per dimostrare in modo semplice e veloce la conformità ai revisori interni ed esterni, ai dirigenti e agli altri principali soggetti interessati.

La suite McAfee Complete Data Protection offre crittografia delle unità, protezione di file e supporti removibili, gestione della crittografia nativa ePO Deep Command.

*Altri nomi e marchi possono essere rivendicati come proprietà di terzi.

Gartner: Intel Security in the leaders quadrant for mobile data protection

Read Report

Need to manage Apple FileVault and Microsoft BitLocker? We have you covered.

Read Solution Brief

Caratteristiche e vantaggi

Proteggere i dispositivi con un efficace sistema di cifratura dei dati

Evita l'accesso non autorizzato ai sistemi e rendi i dati illeggibili nel caso vengano persi o rubati grazie alla crittografia completa dei dischi e al controllo degli accessi su tutti i dispositivi endpoint. Le opzioni includono una crittografia di livello enterprise per le unità oppure la gestione della crittografia nativa per Apple FileVault e Microsoft BitLocker.

Garantisci la protezione continua di file e cartelle

Crittografa in modo automatico e trasparente file e cartelle, prima che vengano smistati in azienda.

Estendi la portata del reparto IT

Comunicando con gli endpoint a un livello sub-sistema operativo, ePO Deep Command permette agli amministratori della sicurezza di configurare e riparare da un sito centrale gli endpoint difficili da gestire, utilizzando una piattaforma di gestione affidabile e conosciuta come McAfee ePolicy Orchestrator.

Centralizzare e semplificare la gestione della protezione dei dati

Utilizza un'unica console McAfee ePolicy Orchestrator (ePO) centralizzata per implementare e applicare le policy di sicurezza aziendali obbligatorie che controllano il modo in cui i dati vengono crittografati, monitorati e protetti. Definisci, implementa, gestisci e aggiorna centralmente le policy di sicurezza che crittografano, filtrano, monitorano e bloccano l'accesso non autorizzato ai dati riservati.

Conformità comprovata da funzionalità avanzate di reportistica e verifica

Controlla gli eventi in tempo reale e crea report dettagliati in grado di dimostrare a revisori, dirigenti senior e altri soggetti interessati la conformità ai requisiti interni e ai requisiti normativi sulla privacy.

Requisiti di sistema

I dati indicati si riferiscono ai requisiti di sistema minimi. I requisiti consigliati sono precisati tra parentesi (ove necessario). I requisiti effettivi variano in relazione all'ambiente in uso.

Endpoint basati su Microsoft Windows

  • Sistemi operativi
    • Microsoft Windows 8.1 (versioni a 32 bit e 64 bit)
    • Microsoft Windows 8 (versioni a 32 bit e 64 bit)
    • Microsoft Windows 7 (versioni a 32 bit e 64 bit)
    • Microsoft Windows Vista (versioni a 32 bit e 64 bit)
    • Microsoft Windows 2008 Server (versioni a 32 bit e 64 bit)
    • Microsoft Windows XP (solo versione a 32 bit)
    • Microsoft Windows 2003 Server con Service Pack 1 (SP1) o versioni successive (solo versione a 32 bit)
  • Requisiti hardware
    • CPU: Pentium III (1 GHz o più veloce)
    • RAM: 256 MB minimo (1 GB consigliato)
    • Hard disk: 200 MB minimo di spazio libero su disco
    • Connessione di rete: TCP/IP per la gestione remota

Portatili Apple Mac

  • Sistemi operativi
    • Mac OS X Leopard (10.5.8 o versioni successive)
    • Mac OS X Lion
    • Mac OS X Mountain Lion
    • Mac OS X Mavericks
  • Requisiti hardware
    • CPU: portatile Mac basato su Intel con EFI a 64 bit
    • RAM: 1 GB minimo
    • Hard disk: 200 MB minimo di spazio libero su disco
    • Connessione di rete: TCP/IP per la gestione remota

Casi cliente

California Department of Corrections and Rehabilitation (CDCR) (English)

Leveraging the Security Connected strategy, the California Department of Corrections and Rehabilitation implemented SIEM, network IPS, data protection, and endpoint security solutions to secure its distributed IT environment over 37 locations.

In primo piano
  • Compliance with policy standards.
  • Dashboards enable centralized security management and provide easy access for executive reporting.

Risorse

Panoramiche sulle soluzioni

Management of Native Encryption (English)

With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.

Breakthroughs in Zero Impact Data Protection (English)

Help stop data loss while maintaining user productivity.

Endpoint Encryption Keeps Your Data Safe (English)

McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.

Enterprise-Ready Solutions for Comprehensive Data Security (English)

All-inclusive drive support fuels both the performance of hardware-based encryption and the flexibility of software-based encryption.

Keep Your Client PCs Safer, Wherever They Go (English)

Learn how hardware-enhanced solutions from Intel and McAfee help you protect and manage remote PCs and data.

Securing the Mobile Enterprise (English)

Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.

Ironclad Security for Lost Devices (English)

Learn how McAfee Endpoint Encryption prevents data loss with comprehensive protection for a wide range of endpoints and robust, centralized management.

Rapporti

Magic Quadrant for Mobile Data Protection 2014 (English)

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

Best Practices in Data Protection (Executive Summary) (English)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Best Practices in Data Protection (Full Report) (English)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Schede tecniche

McAfee Complete Data Protection Suites

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

McAfee Drive Encryption for PCs and Mac

Per un riassunto tecnico sui prodotti McAfee elencati qui sopra, vedere la scheda tecnica del prodotto.

White paper

Healthcare-Friendly Security (English)

This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.

Improving Data Protection with McAfee Drive Encryption (English)

McAfee Drive Encryption provides a hybrid agent that can automatically and transparently detect whether software- or hardware-based encryption is needed.

Protect Your Company’s Data with Efficient Encryption and Secure Remote Management (English)

This paper highlights how integrated hardware-software solutions from Intel and McAfee help you keep remote PCs and data safer with accelerated encryption and secure remote access to PCs powered by Intel Core vPro processors.

Comunità

Blog

  • Protect Yourself by Protecting Others
    Carly Listman - gennaio 21, 2015

    How the consumerization of IT is affecting endpoint security What happens in Vegas may stay in Vegas, but what happens on your employees’ personal devices may not stay there. According to a recent survey of consumers around the world, conducted by MSI Research on behalf of Intel Security, almost 80% of respondents use their personal […]

    The post Protect Yourself by Protecting Others appeared first on McAfee.

  • The Rise of Backdoor-FCKQ (CTB-Locker)
    Raj Samani - gennaio 21, 2015

    By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice President Vincent Weafer commented that 2014 will be remembered as “the year of shaken trust.” Indeed almost every threat measured saw notable increases in Q3 that pointed to a rather ominous 2015.  There was, however, […]

    The post The Rise of Backdoor-FCKQ (CTB-Locker) appeared first on McAfee.

  • The Scan: The Best of CES 2015
    Bradi Van Noy Hays - gennaio 19, 2015

    Hey guys! I’m Bradi, and this is the Scan – bringing you the very latest in security news. It’s 2015, and you know what that means – we’re officially in THE FUTURE. Congratulations, you made it! CES 2015 Rundown Another Consumer Electronics Show has come and gone, which means a lot of tech nerds out […]

    The post The Scan: The Best of CES 2015 appeared first on McAfee.

  • InstallCube: How Russian Programmers Turn Adware Into Cash
    Tarun Agarwal - dicembre 16, 2014

    We often observe applications bundled with ad-displaying programs to generate revenue for those products. These are not necessarily unethical, but some of them try to make easy money by deceiving users. McAfee categorizes such apps as potentially unwanted program (PUPs). Here’s a look at a recently discovered Russian-based campaign that is very well organized. We […]

    The post InstallCube: How Russian Programmers Turn Adware Into Cash appeared first on McAfee.

  • Behavior Analysis Stops Romanian Data-Stealing Campaign
    Ankit Anubhav - dicembre 3, 2014

    In a recent press announcement, McAfee and Europol’s European Cyber Centre announced a cooperation of our talents to fight cybercrime. In general these joint operations are related to large malware families. Writing or spreading malware, even in small campaigns, is a crime. McAfee Labs doesn’t hesitate to reach out to its partners and contacts in […]

    The post Behavior Analysis Stops Romanian Data-Stealing Campaign appeared first on McAfee.