McAfee Complete Data Protection Essential

Native encryption management for Windows and Macs

Essential endpoint encryption management

McAfee Complete Data Protection—Essential protects critical data by managing the native encryption features on Macs and Windows systems.

File and removable media protection

Secure your network file shares, USB drives, DVDs, and protect your data stored in the cloud.

Do more with centralized management

Establish and enforce data protection policies while centralizing data security management using the McAfee ePolicy Orchestrator (McAfee ePO) management console.

Protect against malicious threats

Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.

Leverage built-in reporting and auditing

Use comprehensive dashboards in the McAfee ePO management console to demonstrate security compliance to auditors and other key internal stakeholders.

Protect data and stay compliant

Protect against data loss and theft

Encryption solutions are FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated by the Intel Advanced Encryption Standard–New Instructions (Intel AES-NI).

Manage native encryption with a single console

Manage Apple FileVault and Microsoft BitLocker via McAfee ePO. Use any combination of Microsoft BitLocker or traditional drive encryption on your Windows endpoints.

Encrypt removable media, file shares, and cloud data

Control the types of files and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.

A Gartner Magic Quadrant Leader

Leading analyst firm Gartner has positioned us as a Leader in the Gartner Magic Quadrant for Enterprise Data Loss Prevention for the sixth consecutive time.

Endpoint encryption technologies

McAfee endpoint encryption solutions integrate industry-leading technologies to provide top performance, advanced data protection, seamless deployment for Microsoft Windows and Apple Mac endpoints, as well as protection for storing data in the cloud. Learn more about each of these technologies:

System requirements

These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment. Start of system requirements include:

Microsoft Windows-Based Endpoints

Operating systems
  • Windows 10
  • Windows 8.1 (32-bit and 64-bit versions)
  • Windows 8 (32-bit and 64-bit versions)
  • Windows 7 (32-bit and 64-bit versions)
  • Windows Vista (32-bit and 64-bit versions)
  • Windows 2008 Server (32-bit and 64-bit versions)
  • Windows XP (32-bit version only)
  • Windows 2003 Server with Service Pack 1 (SP1) or higher (32-bit version only)
Hardware requirements
  • CPU: Pentium III (1 GHz or faster)
  • RAM: 256 MB minimum (1 GB recommended)
  • Hard disk: 200 MB minimum free disk space
  • Network connection: TCP/IP for remote management

Apple Mac Laptop Endpoints

Operating systems
  • Mac OS X El Capitan
  • Mac OS X Mavericks
  • Mac OS X Mountain Lion
  • Mac OS X Lion
  • Mac OS X Leopard (10.5.8 or later)
Hardware requirements
  • CPU: Intel-based Mac laptop with 64-bit EFI
  • RAM: 1 GB minimum
  • Hard disk: 200 MB minimum free disk space
  • Network connection: TCP/IP for remote management

Learn more about McAfee Complete Data Protection—Essential

SOLUTION BRIEF

Management of Native Encryption

With the rapid increase of PCs, tablets, and other devices in the enterprise environment, ensure that sensitive data is secured with encryption.

Read Solution Brief >
DATA SHEET

McAfee Complete Data Protection—Essential

McAfee Data Protection Essential includes file, folder, removable media encryption, and management of native encryption for Apple FileVault and Microsoft BitLocker.

Read Data Sheet >
SOLUTION BRIEF

Endpoint Encryption Keeps Your Data Safe

McAfee endpoint encryption solutions protect valuable corporate data on end-user devices and shared servers with comprehensive encryption and integrated, centralized management, consistent policies, robust reporting, and proof of protection.

Read Solution Brief >

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us
Back to top