Imation Mobile Security provides solutions that address the demands of the mobile workforce, for enterprise and government organizations. Organizations want to capture the benefits of the mobile environment for employees, partners, and customers. This demands both the protection of sensitive information and strong regulatory compliance, while maintaining the flexibility and ease of use that mobility promises.


Portable work environments allow employees to access applications and information while being completely mobile. Users simply plug their USB device into any computer, reboot, authenticate their identity, and gain access to their complete Microsoft Windows desktop wherever they go. When users unplug their USB device, no trace of their presence remains behind. Imation Stealth ZONE’s boot-from-USB technology offers excellent security for protecting enterprise data while delivering exceptional overall performance, mobility, and functionality. The solution also includes an industry-leading provisioning system that enables quick deployment of large numbers of devices in a secure and flexible manner.

Imation USB devices — compatible with McAfee Endpoint Encryption and managed by McAfee ePolicy Orchestrator (McAfee ePO) software — use advanced authentication capabilities to secure mobile data. Imation Stealth ZONE leverages the Imation USB product line to deliver a superior, secure mobile workspace. Stealth ZONE transforms any computer into a standard IT-managed system while maintaining both performance and security.

McAfee Integration

McAfee Compatible Solution

The Imation Series of USB devices (1, 2, 4, 8, 16, 32, and 64 GB) are currently compatible for pre-boot authentication with McAfee Endpoint Encryption v6 and McAfee ePO software 4.5 and 4.6.

Type of Integration

Platform support and interoperability

Integration Availability

The integration is available directly from Imation with the products that comprise the McAfee Compatible solution.

Learn More

To learn more about how this partner's solution works with McAfee technology or to request an evaluation, please complete this form (fields marked ** are required). A representative will contact you promptly.