McAfee Complete Data Protection—Advanced

Advanced endpoint encryption

Advanced protection for data at rest and data in motion

Safeguard against data loss, theft, and exposure using endpoint encryption, access control, and user-behavior monitoring.

Get robust data protection

McAfee Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage.

Leverage the encryption solution right for you

Choose between powerful enterprise-grade drive encryption or management of native encryption for Apple FileVault on Mac OS X and Microsoft BitLocker on business versions of Windows.

Achieve centralized management

Enforce data protection policies centrally with the McAfee ePolicy Orchestrator (McAfee ePO) management console.

Prove compliance with advanced reporting

Monitor real-time events and generate detailed reports that show auditors and senior management compliance with internal and regulatory privacy requirements.

More powerful data protection

Gain control over your data

Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.

Protect devices with powerful data encryption

Prevent unauthorized system access and render data unreadable in the event of device loss or theft with full-disk encryption and access control.

Continuous file, folder, and cloud protection

Automatically encrypt files and folders before they move through and outside your organization. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.


From Endpoint to Network to Cloud

Learn the benefits of an integrated data protection solution.


Endpoint encryption technologies

McAfee endpoint encryption solutions integrate industry-leading technologies to provide top performance, advanced data protection, seamless deployment for Microsoft Windows and Apple Mac endpoints, as well as protection for storing data in the cloud. Learn more about each of these technologies:

System requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.

Microsoft Windows-Based Endpoints

Operating systems

  • Windows 10
  • Windows 8.1 (32-bit and 64-bit versions)
  • Windows 8 (32-bit and 64-bit versions)
  • Windows 7 (32-bit and 64-bit versions)
  • Windows Vista (32-bit and 64-bit versions)
  • Windows 2008 Server (32-bit and 64-bit versions)
  • Windows XP (32-bit version only)
  • Windows 2003 Server with Service Pack 1 (SP1) or higher (32-bit version only)

Hardware requirements

  • CPU: Pentium III (1 GHz or faster)
  • RAM: 256 MB minimum (1 GB recommended)
  • Hard disk: 200 MB minimum free disk space
  • Network connection: TCP/IP for remote management

Apple Mac Laptop Endpoints

Operating systems

  • Mac OS X El Capitan
  • Mac OS X Mavericks
  • Mac OS X Mountain Lion
  • Mac OS X Lion
  • Mac OS X Leopard (10.5.8 or later)

Hardware requirements

  • CPU: Intel-based Mac laptop with 64-bit EFI
  • RAM: 1 GB minimum
  • Hard disk: 200 MB minimum free disk space
  • Network connection: TCP/IP for remote management

For additional technical resources, visit the McAfee Expert Center Drive Encryption and Management of Native Encryption pages.

Learn more about McAfee Complete Data Protection—Advanced


Management of Native Encryption

With the rapid increase of PCs, tablets, and other devices in the enterprise environment, ensure that sensitive data is secured with encryption.

Read Solution Brief >
Data Sheet

McAfee Complete Data Protection—Advanced

McAfee Complete Data Protection—Advanced enables enterprises to enforce security policies that regulate and restrict how employees use and transfer sensitive data via email, IM, printing, and USB drives regardless of where they work.

Read Data Sheet >

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us