Data Governance & Device Control
Protect personally identifiable information (PII) and prove compliance in any region
Support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data. Intel Security solutions help you comply with Office of Management and Budget directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections, and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the National Association of State Chief Information Officers’ data governance standards. With our global coverage, Intel Security can work with you to address regulatory and privacy concerns that matter the most to your agency or department.
Protect government and citizen data at rest or in motion. Place appropriate controls on sensitive information before it leaves the government network, and encrypt mobile devices, rendering data inaccessible if lost or stolen.
Protect government data based on users, devices, or policies. Control which devices hold sensitive data, and permit only trusted USB devices with strong authentication and encryption.
Control which devices are used on your network while still supporting mobility among your workforce. Monitor and restrict data copied to removable media and keep it under your control.
Save time and money with a centralized management console that allows you to monitor your entire security system at a glance. Set policies, perform audits, and prove compliance with data privacy regulations and other government mandates.
Ease the compliance burden with predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee Policy Auditor achieves SCAP validation, enabling government agencies to comply with the FDCC mandate.
Monitor and restrict data copied to removable storage devices and media, and implement powerful encryption solutions for PC, network files and folders, mobile devices, virtual disks, removable media, and encrypted USB devices.
Automate data gathering and assessment processes required for internal and external system-level IT audits.
The McAfee Foundstone professional services team evaluates the security of your cloud-based solution to ease the transition to cloud-based services, and reduces your risk by identifying sensitive data copied or currently in transit from its original intended container.