Data Governance & Device Control

Protect personally identifiable information (PII) and prove compliance in any region

Next Steps:

Overview

McAfee’s comprehensive data protection solutions support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data.

McAfee enables compliance with Office of Management and Budget (OMB) directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections (TIC), and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the data governance standards of the National Association of State Chief Information Officers (NASCIO). With our global coverage, we can work with you in-country or in-region to address the regulatory and privacy concerns that matter the most to your agency or department.

Key Benefits

  • Secure data wherever it travels
    Protect government and citizen data at rest or in motion with McAfee safety policies and solutions. Place appropriate controls on sensitive information before it leaves the government network. If mobile devices are lost, you can prove they were properly encrypted beforehand, rendering their data inaccessible.
  • Grant secure, efficient access to guests, contractors, and employees
    Protect government data based on users, devices, or policies. Control which devices hold sensitive data, and ensure only trusted USB devices — with strong authentication and encryption — are used.
  • Manage your security and prove compliance from a central platform
    Save time and money with the McAfee ePolicy Orchestrator (ePO) platform, the centralized management console that allows you to monitor your entire security system at a glance. With ePO software, you can also set policies, perform audits, and prove compliance with data privacy regulations and other government mandates.
  • Empower a mobile workforce
    Control which devices are used on your network while still supporting mobility among your workforce. Monitor and restrict data copied to removable media and keep it under your control.
  • Count on 24/7 security vigilance in a Web 2.0 world
    Rely on McAfee Labs, our 24/7 Global Threat Intelligence team, to ensure your protections remain strong and up-to-date, even as applications and environments change.
  • Comply with FDCC, HIPAA, and PCI
    Ease the compliance burden with McAfee support and predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee Policy Auditor is the first enterprise-ready product to achieve SCAP validation, enabling government agencies to comply with the FDCC mandate. Learn more about Policy Auditor and SCAP.
  • Accelerate time to protection
    Speed rollouts and updates with our automated discovery, proven controls, and centralized management. Get up and running at maximum effectiveness in weeks, not months.
  • Ensure sound policies and practices for data in the cloud
    Determine the best cloud model to meet your needs, and assess potential cloud service providers with McAfee Foundstone Cloud Computing Security Assessments.

Products

Data Protection

McAfee Device Control
McAfee Device Control

McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media so your data stays protected under company control.

McAfee Complete Data Protection
McAfee Complete Data Protection

McAfee Complete Data Protection delivers powerful encryption, preventing unauthorized access to sensitive data, and stopping data loss and exposure. McAfee offers multiple layers of encryption solutions for your PC, network files and folders, mobile devices, virtual disks, removable media, and encrypted USB devices.

McAfee Complete Data Protection — Advanced
McAfee Complete Data Protection — Advanced

McAfee Complete Data Protection — Advanced offers strong encryption, authentication, data loss prevention, and policy-driven security controls to help block unauthorized access to your sensitive information — anytime, anywhere.

Network Security

McAfee Content Security Blade Server
McAfee Network User Behavior Analysis

McAfee Network User Behavior Analysis delivers real-time visibility into what users are doing on your network and how they are using critical business applications. This intuitive view provides the decision support information you need to reduce risk and meet compliance requirements. Automated monitoring, based on packet capture, as well as analysis and instant correlation to security policy, dramatically increases accuracy and reduces the time and effort required to detect behavioral anomalies.

Risk & Compliance

McAfee Policy Auditor
McAfee Policy Auditor

McAfee Policy Auditor automates data gathering and assessment processes required for internal and external system-level IT audits.

McAfee Risk Advisor
McAfee Risk Advisor

McAfee Risk Advisor saves you time and money by proactively correlating threat, vulnerability, and countermeasure information to pinpoint at-risk assets and optimize patching efforts.

Security Management

McAfee ePolicy Orchestrator (ePO)
McAfee ePolicy Orchestrator (ePO)

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.

Services

Cloud Computing Security Assessment

Evaluate the security of your cloud-based solution. McAfee Strategic Security Services' Cloud Computing Security Assessment eases the transition to cloud-based services and assures your customers and business partners that your cloud solution is secure.

Data Loss Prevention Assessment

Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Strategic Security Services reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.

Resources

Brochures

Security Connected for Public Sector: Situation Under Control

Through its optimized, connected security architecture and global threat intelligence, learn how McAfee delivers security that addresses the needs of the military, civilian government organizations, critical sectors, and systems integrators.

Solution Briefs

McAfee Removable Media Security

Explore McAfee solutions that protect data on removable media devices.

McAfee Encrypted USB Product Features and Specifications

This guide includes available features and specifications for the complete range of McAfee Encrypted USB devices.

Principles for Achieving Data Privacy

This business brief discusses privacy-enabling technologies, effective data governance, and security management.

Technology Blueprints

Succeed at Data Readiness

McAfee works closely with a partner, TITUS, to provide resilient data governance solutions that enable government customers to meet regulatory requirements, prevent sensitive data leakage, monitor user compliance, and respond quickly to security incidents.

White Papers

Evolving HBSS to Protect and Enable the Modern Warfighter’s Mission

This paper will examine the future of HBSS and make measurable, tangible recommendations to not only increase overall security and capabilities, but also to lessen the management burden, lower the overall total cost of ownership, allow for better results, particularly in D-DIL environments, and allow JIE real-time operational control over HBSS assets.

The 7 Deadly Threats to 4G - 4G LTE Security Roadmap and Reference Design

This paper provides a detailed review of seven threats that take on unique profiles within 4G networks. It also offers a security reference architecture to efficiently counter these threats with minimal cost or service disruption.

Cloud Computing: Risks and Rewards

Review the security implications of in-the-cloud services and get an overview of best practices to protect cloud-based solutions. This white paper also examines McAfee solutions that protect cloud-based software, as well McAfee's cost-effective software-as-service products that require no additional hardware installation.

Community

Blogs

Threats and Risks