Content

McAfee Endpoint Encryption

McAfee Endpoint Encryption  product shot
Prevent data loss using powerful encryption and strong access control

With data breaches on the rise, it is important for companies to protect their information assets and comply with privacy regulations. McAfee Endpoint Encryption™ delivers powerful encryption and strong access control features that prevent unauthorized access to sensitive data and stop information loss and exposure.

Tab Navigation

Benefits and Features

Benefits:

  • Protect a broad range of data on all devices
    Provide consistent protection for data on desktops, laptops, mobile devices, removable media and portable storage devices; secure a broad range of information including customer data, intellectual property, legal and financial records, and employee records.
  • Keep employees productive
    Maintain operational efficiency with transparent encryption and decryption that causes virtually no interruption to users or system performance; allow users to access, store, share and transfer data safely.
  • Simplify security management
    Implement and enforce company-wide security policies that control data encryption and user authentication—all from a central console; support compliance with internal and external security regulations.
  • Reduce Total Cost of Ownership
    Decrease security costs with an integrated, end-to-end security solution a single vendor; leverage existing systems and security products.
  • Seamlessly integrate with existing infrastructure
    Integrate with other McAfee security products and synchronize with Active Directory, LDAP, PKI, and others; support all Windows operating systems and common languages.

 

Features:

  • McAfee Endpoint Encryption for PC
    Prevent loss of sensitive data on laptops and mobile devices, especially in the event of equipment loss or theft; enforce strong access control with two- and three-factor preboot authentication.
  • McAfee Endpoint Encryption for File/Folder
    Automatically encrypt files and folders as they are shared or moved through an organization; scale to support a virtually unlimited number of users.
  • McAfee Endpoint Encryption for Removable Media (Extension to File/Folder)
    Protect information saved on removable devices and media that can connect to enterprise endpoints; read, edit and save encrypted data without installing any software.
  • McAfee Endpoint Encryption for Mobile
    Secure mobile devices by preventing unauthorized use or access to data on the devices; encrypt standard applications: contacts, calendar, tasks, emails, etc.
  • McAfee Endpoint Encryption for Virtual Disk
    Extend security across virtualized environments including shared platforms, networks and devices; define and encrypt personal virtual disks that are fully portable and easily controlled.
  • McAfee Encrypted USB
    McAfee’s range of encrypted USB devices extend security to your mobile workforce by guardingdata copied and transported on portable USB storage devices; easily monitor encrypted devices enterprise-wide. Protection is extended with the inclusion of the McAfee Anti-Virus solution on some devices. 

Description:

Protecting information assets is one of the most important issues facing businesses today. Secure your company’s mission-critical information with McAfee Endpoint Encryption, using industry-leading encryption algorithms and strong access control to prevent unauthorized access to your sensitive data.

Endpoint Encryption offers multiple layers of protection that address specific areas of risk. Encryption is extended to PCs, laptops, network files and folders, mobile devices, removable media, and portable storage devices. And you can secure a broader scope of information including customer data, intellectual property, legal and financial records, and employee communications. 

Encryption happens transparently and “on the fly,” with virtually no system performance degradation. And single sign-on authentication gives users secure yet convenient access to the information needed to do their jobs efficiently. As a result, your data will remain protected regardless of how it is used, stored or transferred, and you can maintain business continuity.

Integrated Capabilities and Centralized Management

McAfee Endpoint Encryption leverages the award-winning McAfee ePolicy Orchestrator (ePO) infrastructure for automated security reporting, monitoring, deployment and policy administration. The suite allows organizations to monitor encrypted devices across the organization. Administrators can customize encryption settings and easily grant or prohibit access by individuals or user groups.

Simplified Compliance and Lower TCO

Centralized management features and integrated capabilities make it easy and cost-effective for companies to ensure consistent protection across the enterprise. Company-wide security policies can be effortlessly enforced behind the scenes. And auditing capabilities make it simpler to demonstrate compliance with internal and external security requirements.

The Endpoint Encryption suite is easily integrated with other McAfee security products, as well as existing enterprise systems, giving businesses a comprehensive security solution while easing deployment and reducing the total cost of ownership for businesses.


 

System Requirements:

Note: The following are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Desktop, laptop, and tablet endpoints

Operating systems

  • Microsoft Vista (all 32- and 64-bit versions)
  • Microsoft Windows XP
  • Microsoft Windows 2000
  • Microsoft Windows 2003 Server SP1 or higher

Hardware requirements

  • CPU: Pentium-compatible
  • RAM: 128 MB minimum
  • Disk space: 5–35 MB available, depending on localization and number of devices
  • Network connection: TCP/IP for remote access

Mobile endpoints

Desktops/laptops

  • CPU: Pentium-compatible
  • RAM: 128 MB recommended
  • Disk space: 5–35 MB depending on localization and number of users
  • Network connection: TCP/IP for remote access

 

Mobile endpoints

  • CPU: 195 MHz minimum
  • RAM: 64 MB
  • Network connection: TCP/IP for remote administration and Activesync 4.5 or higher for wired policy installation/updates

Centralized management

Operating systems

  • Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003

Hardware requirements

  • RAM: 128 MB minimum, 512 MB recommended
  • Disk space: 200 MB
  • CPU: Pentium-compatible