Content
McAfee Endpoint Encryption
Prevent data loss using powerful encryption and strong access control
With data breaches on the rise, it is important for companies to protect their information assets and comply with privacy regulations. McAfee Endpoint Encryption™ delivers powerful encryption and strong access control features that prevent unauthorized access to sensitive data and stop information loss and exposure.
Tab Navigation
Benefits and Features
Benefits:
- Protect a broad range of data on all devices
Provide consistent protection for data on desktops, laptops, mobile devices, removable media and portable storage devices; secure a broad range of information including customer data, intellectual property, legal and financial records, and employee records. - Keep employees productive
Maintain operational efficiency with transparent encryption and decryption that causes virtually no interruption to users or system performance; allow users to access, store, share and transfer data safely. - Simplify security management
Implement and enforce company-wide security policies that control data encryption and user authentication—all from a central console; support compliance with internal and external security regulations. - Reduce Total Cost of Ownership
Decrease security costs with an integrated, end-to-end security solution a single vendor; leverage existing systems and security products. - Seamlessly integrate with existing infrastructure
Integrate with other McAfee security products and synchronize with Active Directory, LDAP, PKI, and others; support all Windows operating systems and common languages.
Features:
- McAfee Endpoint Encryption for PC
Prevent loss of sensitive data on laptops and mobile devices, especially in the event of equipment loss or theft; enforce strong access control with two- and three-factor preboot authentication. - McAfee Endpoint Encryption for File/Folder
Automatically encrypt files and folders as they are shared or moved through an organization; scale to support a virtually unlimited number of users. - McAfee Endpoint Encryption for Removable Media (Extension to File/Folder)
Protect information saved on removable devices and media that can connect to enterprise endpoints; read, edit and save encrypted data without installing any software. - McAfee Endpoint Encryption for Mobile
Secure mobile devices by preventing unauthorized use or access to data on the devices; encrypt standard applications: contacts, calendar, tasks, emails, etc. - McAfee Endpoint Encryption for Virtual Disk
Extend security across virtualized environments including shared platforms, networks and devices; define and encrypt personal virtual disks that are fully portable and easily controlled. - McAfee Encrypted USB
McAfee’s range of encrypted USB devices extend security to your mobile workforce by guardingdata copied and transported on portable USB storage devices; easily monitor encrypted devices enterprise-wide. Protection is extended with the inclusion of the McAfee Anti-Virus solution on some devices.
Description:
Protecting information assets is one of the most important issues facing businesses today. Secure your company’s mission-critical information with McAfee Endpoint Encryption, using industry-leading encryption algorithms and strong access control to prevent unauthorized access to your sensitive data.
Endpoint Encryption offers multiple layers of protection that address specific areas of risk. Encryption is extended to PCs, laptops, network files and folders, mobile devices, removable media, and portable storage devices. And you can secure a broader scope of information including customer data, intellectual property, legal and financial records, and employee communications.
Encryption happens transparently and “on the fly,” with virtually no system performance degradation. And single sign-on authentication gives users secure yet convenient access to the information needed to do their jobs efficiently. As a result, your data will remain protected regardless of how it is used, stored or transferred, and you can maintain business continuity.
Integrated Capabilities and Centralized Management
McAfee Endpoint Encryption leverages the award-winning McAfee ePolicy Orchestrator (ePO) infrastructure for automated security reporting, monitoring, deployment and policy administration. The suite allows organizations to monitor encrypted devices across the organization. Administrators can customize encryption settings and easily grant or prohibit access by individuals or user groups.
Simplified Compliance and Lower TCO
Centralized management features and integrated capabilities make it easy and cost-effective for companies to ensure consistent protection across the enterprise. Company-wide security policies can be effortlessly enforced behind the scenes. And auditing capabilities make it simpler to demonstrate compliance with internal and external security requirements.
The Endpoint Encryption suite is easily integrated with other McAfee security products, as well as existing enterprise systems, giving businesses a comprehensive security solution while easing deployment and reducing the total cost of ownership for businesses.
System Requirements:
Note: The following are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Desktop, laptop, and tablet endpoints
Operating systems
- Microsoft Vista (all 32- and 64-bit versions)
- Microsoft Windows XP
- Microsoft Windows 2000
- Microsoft Windows 2003 Server SP1 or higher
Hardware requirements
- CPU: Pentium-compatible
- RAM: 128 MB minimum
- Disk space: 5–35 MB available, depending on localization and number of devices
- Network connection: TCP/IP for remote access
Mobile endpoints
Desktops/laptops
- CPU: Pentium-compatible
- RAM: 128 MB recommended
- Disk space: 5–35 MB depending on localization and number of users
- Network connection: TCP/IP for remote access
Mobile endpoints
- CPU: 195 MHz minimum
- RAM: 64 MB
- Network connection: TCP/IP for remote administration and Activesync 4.5 or higher for wired policy installation/updates
Centralized management
Operating systems
- Microsoft Windows 2000
- Microsoft Windows XP
- Microsoft Windows Server 2003
Hardware requirements
- RAM: 128 MB minimum, 512 MB recommended
- Disk space: 200 MB
- CPU: Pentium-compatible