McAfee Device Control protects your data from falling into the wrong hands via removable storage devices and media, such as USB drives, MP3 players, CDs, and DVDs. It enables you to specify and categorize which devices may or may not be used and enforce what data can and cannot be transferred to these devices — in the office, at home, or on the move. Device Control provides content- and context-aware, device-blocking capabilities such as:
Comprehensive device and data management — Control how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more.
Granular controls — Specify which devices can and can’t be used, define what data can and can’t be copied onto allowed devices, and restrict users from copying data from specific locations and applications.
Centralized management — Centrally define, deploy, manage, and update security policies and agents throughout your enterprise. Set device and data policies by user, group, or department.
Advanced reporting and auditing capabilities — Support compliance with detailed user- and device-level logging. Gather details such as device, time stamp, and data evidence for prompt and proper audits.
Gain visibility and manage what and how users copy valuable company data to removable media.
Monitor and regulate (with granular controls) how your employees transfer data to removable media, such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices — even when users are not connected to the corporate network.
Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device. Ensure that employees continue to use allowed devices safely.
Use the centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce security policies that prevent confidential data from leaving the company’s control and being lost or stolen.
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.
The following are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
This Dominican Republic-based reseller of IT services relies on a portfolio of on-premises and cloud-based McAfee endpoint and data protection solutions to serve its base of SMB customers.
This provider of banking IT services centralizes security management and improves security throughout its endpoints, including ATMs and point-of service systems in branches.
Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.
McAfee provides thumb drives and hard disks that meet Department of Defense requirements.
For a technical summary on the McAfee product listed above, please view the product data sheet.
written by Piyush Mittal Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.
When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]
The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.
For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches. While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]
When social media really took off about 10 years ago, I think many of us assumed that it might just provide the perfect platform for true freedom of expression. But has this really happened? Are we sharing our convictions and opinions on our Twitter feeds and Facebook pages? Apparently not. A study conducted by The […]
The post Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared? appeared first on McAfee.
Being in love in the digital age is far more complicated than the ‘good ‘ole days’. The way we court and communicate has been turned on its head by the Internet. The fact that we can be ‘researched’ online, have our movements constantly analysed along with the constant obligation to be in touch with our […]