Intel Security

Data Governance & Device Control

Protect personally identifiable information (PII) and prove compliance in any region


Security Connected for the public sector

Read Brochure

Comprehensive data protection to safeguard PII

Support worldwide and regional initiatives to safeguard personally identifiable information (PII), as well as the most sensitive government data. Intel Security solutions help you comply with Office of Management and Budget directives, such as M-06-15, M-06-16, M-07-16, Trusted Internet Connections, and the Federal Desktop Core Configuration (FDCC) standard. We also help government CIOs meet the National Association of State Chief Information Officers’ data governance standards. With our global coverage, Intel Security can work with you to address regulatory and privacy concerns that matter the most to your agency or department.

Protecting data to meet compliance requirements

Secure data wherever it travels

Protect government and citizen data at rest or in motion. Place appropriate controls on sensitive information before it leaves the government network, and encrypt mobile devices, rendering data inaccessible if lost or stolen.

Grant secure access to guests, contractors, and employees

Protect government data based on users, devices, or policies. Control which devices hold sensitive data, and permit only trusted USB devices with strong authentication and encryption.

Empower a mobile workforce

Control which devices are used on your network while still supporting mobility among your workforce. Monitor and restrict data copied to removable media and keep it under your control.

Manage security and prove compliance

Save time and money with a centralized management console that allows you to monitor your entire security system at a glance. Set policies, perform audits, and prove compliance with data privacy regulations and other government mandates.

Comply with FDCC, HIPAA, and PCI

Ease the compliance burden with predefined templates for FDCC and other open content protocols, including SCAP, XCCDF, and OVAL. McAfee Policy Auditor achieves SCAP validation, enabling government agencies to comply with the FDCC mandate.

Endpoint encryption keeps your data safe

Read Solution Brief


Data Protection

Monitor and restrict data copied to removable storage devices and media, and implement powerful encryption solutions for PC, network files and folders, mobile devices, virtual disks, removable media, and encrypted USB devices.

Risk & Compliance

Automate data gathering and assessment processes required for internal and external system-level IT audits.

Related Products & Solutions


The McAfee Foundstone professional services team evaluates the security of your cloud-based solution to ease the transition to cloud-based services, and reduces your risk by identifying sensitive data copied or currently in transit from its original intended container.