Total Protection for Data
- Gain visibility and control over your data
Monitor and regulate how your employees use and transfer data via common channels, such as email, IM, printing, and USB drives; you remain in control whether they are in the office, at home, or on the move
- Protect devices with powerful encryption
Prevent unauthorized system access and render sensitive data useless in the event of device loss or theft by implementing award-winning encryption and strong access control on all endpoint devices
- Ensure continual file and folder protection
Automatically and transparently encrypt files and folders on the fly—before they move through your organization
- Centralize your security management
Use a single, centralized console to implement and enforce mandatory, company-wide security policies that control how sensitive data is encrypted, monitored, and protected from loss; reduce management effort, time, and training
- Prove compliance with less effort
Monitor real-time events and generate detailed reports to demonstrate compliance with internal and regulatory privacy requirements to auditors, senior management, and other stakeholders
- Total data protection
Control how employees transfer data over the network, use it in applications, and copy it to removable storage devices; protect data in any format—even if it's modified
- Powerful full-disk encryption
Rest assured that data is securely encrypted whenever it's stored on desktops, laptops, tablets, and mobile devices, thanks to strong algorithms such as RC5-1024 and AES-256; automatic, transparent encryption eliminates the need for user action
- Persistent file and folder encryption
Keep files and folders secure wherever they are saved, such as on local hard disks, file servers, removable media—and even as email attachments—using Persistent Encryption Technology
- Strong access control
Prevent unauthorized access and subsequent data loss with two-factor preboot authentication, which supports many different smart cards and USB tokens; Total Protection for Data also supports single sign-on to minimize hassles for authorized users
- Centralized management
Centrally define, deploy, manage, and update security policies that encrypt, filter, monitor, and block unauthorized access to confidential data; maintain central control over user credentials, including synchronization, recovery, and revocation
- Advanced reporting and auditing capabilities
Support compliance with company, industry, and government regulations; record such information as device, time stamp, and data evidence
- Seamless integration with existing infrastructure
Synchronize this solution with Active Directory, PKI, and others; supports all Windows operating systems, common languages, and various keyboards
Of all your company’s assets, the one thieves would most like to get their hands on is your data. Unprotected data is easy to steal, transport, use, and sell. The ubiquity of the Internet and a steadily increasing number of mobile devices haven’t made the situation any easier.
Thankfully, there’s McAfee Total Protection for Data. This comprehensive solution protects your data in use, in transit, and at rest against loss or theft using powerful encryption, strong access control, user behavior monitoring, and policy-driven security enforcement.
Preventing data loss begins with improving visibility and control over your data. Total Protection for Data helps you design, implement, and manage company-wide security policies that control how employees use and transfer your sensitive information via common channels such as email, IM, printing, and USB drives. You stay in control whether users are in the office, at home, or on the move.
The solution also helps stop data loss initiated by Trojans, worms, and file-sharing applications that hijack employee credentials.
This solution’s full-disk encryption helps ensure that information remains secure when it’s stored on desktops, laptops, tablets, and other mobile devices. File and folder encryption lets you control which specific file types and folders are encrypted—and ensure they stay encrypted, regardless of where they are saved using Persistent Encryption Technology™.
Planned integration with McAfee’s own ePolicy Orchestrator® (ePO™) in 2008* will provide a single centralized console for efficiently putting McAfee security to work for your company while reducing management effort, time, and training.
Finally, Total Protection for Data helps you meet stringent policies for safeguarding confidential information. With the solution’s advanced reporting and auditing capabilities, you can quickly and easily demonstrate compliance to internal and external auditors, board members, and other key stakeholders.