McAfee Complete Data Protection

McAfee Complete Data Protection

Comprehensive endpoint encryption solution

Next Steps:

Overview

The McAfee Complete Data Protection suite protects your data using a combination of powerful enterprise-grade endpoint encryption and access control. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console. This suite optionally includes management of native encryption for encryption native to Mac and Microsoft Windows PCs*. Additionally, McAfee ePO Deep Command provides remote security management to access Intel vPro-based PCs to implement patches, reset passwords, and remediate broken endpoints.

The McAfee Complete Data Protection suite helps:

  • Protect your data from loss or theft with a blazingly-fast endpoint encryption solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated by the Intel Advanced Encryption Standard New Instructions (Intel AES-NI).
  • Encrypt storage on desktops, virtual desktop infrastructure workstations, laptops, tablets, and removable media such as CD/DVD and USB flash devices. You control what specific file types and folders are encrypted.
  • Utilize management of native encryption for Macs with Apple FileVault and Windows PCs with Microsoft BitLocker.
  • Extend the reach of IT with Intel vPro and Intel Active Management Technology-based platforms for secure remote access, regardless of PC power or encrypted state.
  • Deploy and provision with confidence with the Endpoint Encryption Go utility to ensure your endpoints have passed pre-encryption inspections and on-going health monitoring.
  • Use advanced reporting and auditing capabilities to quickly and easily demonstrate security compliance to internal and external auditors, and other key stakeholders.

McAfee Complete Data Protection suite offers drive encryption, file & removable media protection, management of native encryption, and ePO Deep Command.

*Other names and brands may be claimed as the property of others.

Intel Security Positioned as a Leader in the Gartner Magic Quadrant for Mobile Data Protection
Protect Your Company’s Data with Efficient Encryption and Secure Remote Management
Keep Your Client PCs Safer, Wherever They Go

Features & Benefits

Protect devices with powerful data encryption

Prevent unauthorized system access and render sensitive data unreadable in the event of device loss or theft by implementing full-disk encryption and access control on all endpoint devices.

Ensure continual file and folder protection

Automatically and transparently encrypt files and folders on the fly — before they move through and outside your organization.

Extend the reach of IT

By communicating with endpoints at a level beyond the operating system, ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.

Centralize and simplify your data security management

Use a single, centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce mandatory, company-wide security policies that control how data is encrypted, monitored, and protected from loss. Centrally define, deploy, manage, and update data security policies that encrypt, filter, monitor, and block unauthorized access to confidential data.

Prove compliance with advanced reporting and auditing capabilities

Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.

System Requirements

The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

Microsoft Windows-Based Endpoints

  • Operating systems
    • Microsoft Windows 8.1 (32-bit and 64-bit versions)
    • Microsoft Windows 8 (32-bit and 64-bit versions)
    • Microsoft Windows 7 (32-bit and 64-bit versions)
    • Microsoft Windows Vista (32-bit and 64-bit versions)
    • Microsoft Windows 2008 Server (32-bit and 64-bit versions)
    • Microsoft Windows XP (32-bit version only)
    • Microsoft Windows 2003 Server with Service Pack 1 (SP1) or higher (32-bit version only)
  • Hardware requirements
    • CPU: Pentium III (1 GHz or faster)
    • RAM: 256 MB minimum (1 GB recommended)
    • Hard disk: 200 MB minimum free disk space
    • Network connection: TCP/IP for remote management

Apple Mac Laptop Endpoints

  • Operating systems
    • Mac OS X Leopard (10.5.8 or later)
    • Mac OS X Lion
    • Mac OS X Mountain Lion
    • Mac OS X Mavericks
  • Hardware requirements
    • CPU: Intel-based Mac laptop with 64-bit EFI
    • RAM: 1 GB minimum
    • Hard disk: 200 MB minimum free disk space
    • Network connection: TCP/IP for remote management

Customer Stories

Arab National Bank

Arab National Bank uses McAfee ePolicy Orchestrator (ePO) software to manage endpoint protection across 5,500 endpoints.

Highlights
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Berkshire Health Systems

Berkshire Health Systems implemented McAfee Total Protection for Data across its extended enterprise to provide device control, full disk and file and folder encryption, and host data loss prevention.

Highlights
  • Removed email management burden and frees up several hours each week
  • Simplified security administration and system management of 3,700 machines
  • Provided comprehensive control of sensitive information to eliminate data loss
  • Allowed a small IT staff complete visibility into all endpoints and data
  • Afforded significant time savings due to centralized management and automated tasks

Cardnet

Cardnet eliminates malware infections with comprehensive network, email, and endpoint security from McAfee.

Highlights
  • Total absence of known infections of any kind
  • Protected the entire IT infrastructure
  • Maintained IT security with a staff of three, versus 20 or more if the McAfee suite was not in place

NYC Department of IT and Telecommunications

NYC Department of IT and Telecommunications uses McAfee for for vulnerability management, endpoint encryption, and other areas of security functionality.

Highlights
  • Increased protection with a savings of $18 million
  • Provided centralized control across highly distributed IT environment

The Doe Run Company

The Doe Run Company protects intellectual property with McAfee Total Protection for Data.

Highlights
  • Enabled proactive enforcement of intellectual property security policies
  • Dramatically reduced the risks of mobile computing
  • Delivered robust safeguards at the host and the gateway
  • Automatically blocked data loss
  • Centralized security policy management

Resources

Data Sheets

McAfee Complete Data Protection

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Magic Quadrant for Mobile Data Protection 2014

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

Best Practices in Data Protection (Executive Summary)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Best Practices in Data Protection (Full Report)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Solution Briefs

Breakthroughs in Zero Impact Data Protection

Help stop data loss while maintaining user productivity.

Endpoint Encryption Keeps Your Data Safe

McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.

Enterprise-Ready Solutions for Comprehensive Data Security

All-inclusive drive support fuels both the performance of hardware-based encryption and the flexibility of software-based encryption.

Keep Your Client PCs Safer, Wherever They Go

Learn how hardware-enhanced solutions from Intel and McAfee help you protect and manage remote PCs and data.

Securing the Mobile Enterprise

Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.

Ironclad Security for Lost Devices

Learn how McAfee Endpoint Encryption prevents data loss with comprehensive protection for a wide range of endpoints and robust, centralized management.

White Papers

Improving Data Protection with McAfee Drive Encryption

McAfee Drive Encryption provides a hybrid agent that can automatically and transparently detect whether software- or hardware-based encryption is needed.

Protect Your Company’s Data with Efficient Encryption and Secure Remote Management

This paper highlights how integrated hardware-software solutions from Intel and McAfee help you keep remote PCs and data safer with accelerated encryption and secure remote access to PCs powered by Intel Core vPro processors.

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs