McAfee Complete Data Protection — Advanced

McAfee Complete Data Protection — Advanced

Comprehensive data protection suites

Next Steps:

Overview

The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console. This advanced suite features data loss prevention, device control, and optionally, management of native encryption for Apple FileVault native to Macs and Microsoft BitLocker management for Windows PCs*. Additionally, McAfee ePO Deep Command provides remote security management to access Intel vPro-based PCs to implement patches, reset passwords, and to remediate broken endpoints.

The McAfee Complete Data Protection — Advanced suite helps:

  • Control how employees access, use, and transfer sensitive information via common channels, such as email, IM, printing, and USB drives. You stay in control of your data protection whether users are in the office, at home, or on the move.
  • Protect your data from loss or theft with a blazing fast endpoint encryption solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated by the Intel Advanced Encryption Standard New Instructions (Intel AES-NI).
  • Encrypt storage on desktops, virtual desktop infrastructure workstations, laptops, tablets, and removable media such as CD/DVD and USB flash devices. You control what specific file types and folders are encrypted.
  • Utilize management of native encryption for Macs with Apple FileVault and Windows PCs with Microsoft BitLocker.
  • Extend the reach of IT with Intel vPro and Intel Active Management Technology-based platforms for secure remote access, regardless of PC power or encrypted state.
  • Deploy and provision with confidence with the Endpoint Encryption Go utility to ensure your endpoints have passed pre-encryption inspections and ongoing health monitoring.
  • Use advanced reporting and auditing capabilities to quickly and easily demonstrate security compliance to internal and external auditors, and other key stakeholders.

McAfee Complete Data Protection — Advanced is the full data protection suite that includes DLP Endpoint, Device Control, drive encryption, file and removable media protection, management of native encryption and ePO Deep Command.

*Other names and brands may be claimed as the property of others.

Gartner: Intel Security in the leaders quadrant for mobile data protection

Read Report

Need to manage Apple FileVault and Microsoft BitLocker? We have you covered.

Read Solution Brief

Stronger data protection and encryption with McAfee and Intel

Read White Paper

Features & Benefits

Gain control over your data

Monitor and regulate how your employees access, use, and transfer data via common channels, such as email, IM, printing, and USB drives — both in and away from the office.

Protect devices with powerful data encryption

Prevent unauthorized system access and render sensitive data unreadable in the event of device loss or theft by implementing full-disk encryption and access control on all endpoint devices. Encryption options include enterprise-grade drive encryption or management of native encryption for Apple FileVault and Microsoft BitLocker management.

Ensure continual file and folder protection

Automatically and transparently encrypt files and folders on the fly — before they move through and outside your organization.

Extend the reach of IT

By communicating with endpoints at a level beyond the operating system, ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.

Centralize and simplify your data security management

Use a single, centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce mandatory, company-wide security policies that control how data is encrypted, monitored, and protected from loss. Centrally define, deploy, manage, and update data security policies that encrypt, filter, monitor, and block unauthorized access to confidential data.

Prove compliance with advanced reporting and auditing capabilities

Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.

Technologies

McAfee endpoint encryption solutions integrate industry-leading technologies to provide top performance, advanced data protection, and seamless deployment for Microsoft Windows and Apple Mac endpoints. Learn more about each of these technologies below:

System Requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Server 2003 Service Pack 1 (SP1), 2003 R2
  • Hardware requirements
    • CPU: Pentium II-class 450 MHz or faster
    • RAM: 512 MB (1 GB recommended)
    • Disk space: 250 MB

Desktop & Laptop Endpoints

  • Operating systems
    • Microsoft Windows 8.1
    • Microsoft Windows 8
    • Microsoft Windows 7
    • Microsoft Windows Vista
    • Microsoft Windows XP Professional SP1 or higher
    • Microsoft Windows 2000 SP4 or higher
  • Hardware requirements
    • CPU: Pentium III 1 GHz or faster
    • RAM: 512 MB (recommended)
    • Disk space: 200 MB
    • Network connection: TCP/IP for remote access

Windows Mobile Endpoints

  • Operating systems
    • Microsoft Windows Mobile 6.0 for Smartphone
    • Microsoft Windows Mobile 6.0 for PDA
    • Microsoft Windows Mobile 5.0 for Smartphone
    • Microsoft Windows Mobile 5.0 for Pocket PC
  • Hardware requirements
    • CPU: 195 MHz
    • RAM: 64 MB
    • Network connection: TCP/IP for remote administration and ActiveSync 4.5 or higher for wired policy installation/updates

Resources

Data Sheets

McAfee Complete Data Protection — Advanced

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Magic Quadrant for Mobile Data Protection 2014

McAfee positioned as a leader in Gartner’s Magic Quadrant for Mobile Data Protection.

Solution Briefs

Management of Native Encryption

With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it’s critical to ensure that sensitive data is secure, and one of the best ways to achieve it is with encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.

Breakthroughs in Zero Impact Data Protection

Help stop data loss while maintaining user productivity.

Endpoint Encryption Keeps Your Data Safe

McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof-of-protection.

Enterprise-Ready Solutions for Comprehensive Data Security

All-inclusive drive support fuels both the performance of hardware-based encryption and the flexibility of software-based encryption.

Keep Your Client PCs Safer, Wherever They Go

Learn how hardware-enhanced solutions from Intel and McAfee help you protect and manage remote PCs and data.

Securing the Mobile Enterprise

Learn about McAfee's comprehensive range of integrated and centrally managed data protection solutions, extending from the enterprise’s data center to desktops, laptops, USB devices, smartphones, and tablets.

Ironclad Security for Lost Devices

Learn how McAfee Endpoint Encryption prevents data loss with comprehensive protection for a wide range of endpoints and robust, centralized management.

White Papers

Healthcare-Friendly Security

This white paper addresses the need for healthcare-friendly security as a means of minimizing the potential for data breaches while enabling its safe, transit, and storage of patient information in a clinical setting. McAfee, a part of Intel Security, provides solutions that integrate security software with hardware to empower healthcare practitioners with flexible technology options that enable them to deliver the best possible care.

Improving Data Protection with McAfee Drive Encryption

McAfee Drive Encryption provides a hybrid agent that can automatically and transparently detect whether software- or hardware-based encryption is needed.

Protect Your Company’s Data with Efficient Encryption and Secure Remote Management

This paper highlights how integrated hardware-software solutions from Intel and McAfee help you keep remote PCs and data safer with accelerated encryption and secure remote access to PCs powered by Intel Core vPro processors.

Top Five McAfee ePolicy Orchestrator Tips

This paper highlights some of the top best practices for implementing McAfee endpoint products with McAfee ePolicy Orchestrator software.

Community

Blogs

  • Meet ‘Tox': Ransomware for the Rest of Us
    Jim Walter - May 23, 2015

    The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free.       […]

    The post Meet ‘Tox': Ransomware for the Rest of Us appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Defending Against Ransomware with McAfee Threat Intelligence Exchange
    Dan Larson - April 30, 2015

    In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]

    The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.