The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console.
- Gain control over your data
Monitor and regulate how your employees access, use, and transfer data via common channels, such as email, IM, printing, and USB drives — both in and away from the office.
- Protect devices with powerful data encryption
Prevent unauthorized system access and render sensitive data unreadable in the event of device loss or theft by implementing full-disk encryption and access control on all endpoint devices. Encryption options include enterprise-grade drive encryption or management of native encryption for Apple FileVault and Microsoft BitLocker management.
- Ensure continual file and folder protection
Automatically and transparently encrypt files and folders on the fly — before they move through and outside your organization.
- Extend the reach of IT
By communicating with endpoints at a level beyond the operating system, ePO Deep Command allows security administrators to configure and remediate hard-to-manage endpoints from a central site, using an established and familiar management platform — McAfee ePolicy Orchestrator.
- Centralize and simplify your data security management
Use a single, centralized McAfee ePolicy Orchestrator (ePO) console to implement and enforce mandatory, company-wide security policies that control how data is encrypted, monitored, and protected from loss. Centrally define, deploy, manage, and update data security policies that encrypt, filter, monitor, and block unauthorized access to confidential data.
- Prove compliance with advanced reporting and auditing capabilities
Monitor real-time events and generate detailed reports that show auditors, senior management, and other stakeholders your compliance with internal and regulatory privacy requirements.