Data Governance & Device Control

Protect personally identifiable information (PII) and prove compliance in any region

Next Steps:


McAfee’s comprehensive data protection solutions support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data.

McAfee enables compliance with Office of Management and Budget (OMB) directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections (TIC), and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the data governance standards of the National Association of State Chief Information Officers (NASCIO). With our global coverage, we can work with you in-country or in-region to address the regulatory and privacy concerns that matter the most to your agency or department.

Key Benefits

  • Secure data wherever it travels
    Protect government and citizen data at rest or in motion with McAfee safety policies and solutions. Place appropriate controls on sensitive information before it leaves the government network. If mobile devices are lost, you can prove they were properly encrypted beforehand, rendering their data inaccessible.
  • Grant secure, efficient access to guests, contractors, and employees
    Protect government data based on users, devices, or policies. Control which devices hold sensitive data, and ensure only trusted USB devices — with strong authentication and encryption — are used.
  • Manage your security and prove compliance from a central platform
    Save time and money with the McAfee ePolicy Orchestrator (ePO) platform, the centralized management console that allows you to monitor your entire security system at a glance. With ePO software, you can also set policies, perform audits, and prove compliance with data privacy regulations and other government mandates.
  • Empower a mobile workforce
    Control which devices are used on your network while still supporting mobility among your workforce. Monitor and restrict data copied to removable media and keep it under your control.
  • Count on 24/7 security vigilance in a Web 2.0 world
    Rely on McAfee Labs, our 24/7 Global Threat Intelligence team, to ensure your protections remain strong and up-to-date, even as applications and environments change.
  • Comply with FDCC, HIPAA, and PCI
    Ease the compliance burden with McAfee support and predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee Policy Auditor is the first enterprise-ready product to achieve SCAP validation, enabling government agencies to comply with the FDCC mandate.
  • Accelerate time to protection
    Speed rollouts and updates with our automated discovery, proven controls, and centralized management. Get up and running at maximum effectiveness in weeks, not months.
  • Ensure sound policies and practices for data in the cloud
    Determine the best cloud model to meet your needs, and assess potential cloud service providers with McAfee Foundstone Cloud Computing Security Assessments.


Data Protection

McAfee Device Control
McAfee Device Control

McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media so your data stays protected under company control.

McAfee Complete Data Protection
McAfee Complete Data Protection

McAfee Complete Data Protection delivers powerful encryption, preventing unauthorized access to sensitive data, and stopping data loss and exposure. McAfee offers multiple layers of encryption solutions for your PC, network files and folders, mobile devices, virtual disks, removable media, and encrypted USB devices.

McAfee Complete Data Protection — Advanced
McAfee Complete Data Protection — Advanced

McAfee Complete Data Protection — Advanced offers strong encryption, authentication, data loss prevention, and policy-driven security controls to help block unauthorized access to your sensitive information — anytime, anywhere.

Risk & Compliance

McAfee Policy Auditor
McAfee Policy Auditor

McAfee Policy Auditor automates data gathering and assessment processes required for internal and external system-level IT audits.

Security Management

McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.


Cloud Computing Security Assessment

Evaluate the security of your cloud-based solution. McAfee Foundstone’s Cloud Computing Security Assessment eases the transition to cloud-based services and assures your customers and business partners that your cloud solution is secure.

Data Loss Prevention Assessment

Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Foundstone reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.



Security Connected for Public Sector: Situation Under Control

Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.

Solution Briefs

Endpoint Encryption Keeps Your Data Safe

McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.

Technology Blueprints

Succeed at Data Readiness

McAfee works closely with a partner, TITUS, to provide resilient data governance solutions that enable government customers to meet regulatory requirements, prevent sensitive data leakage, monitor user compliance, and respond quickly to security incidents.

White Papers

Healthcare-Friendly Security

This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.



Threats and Risks