Advanced protection for data at rest and data in motion
McAfee Complete Data Protection—Advanced
Ordering Made Simple
Easy as 1-2-3
Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses.
According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and Internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority.
McAfee® Complete Data Protection addresses all of these concerns and many more.
Data Loss Prevention for Greater Control
Enterprise-Grade Drive Encryption
Preventing data loss at the endpoint begins with improving visibility and control over your data, even when it is disguised.
Uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, VDI workstations, laptops, USB drives, CD/DVDs, and more.
Removable Media, File and Folder, andCloud Storage Encryption
Management of Native Encryption
Specific files and folders are always encrypted, regardless of where data is edited, copied, or saved.
Management of native encryption allows you to manage the native encryption functionality offered by Apple FileVault on OS X and Microsoft BitLocker on Windows platforms McAfee Complete Data Protection—Advanced 2 Data Sheet directly from McAfee® ePolicy Orchestrator® (McAfee ePO™) software.
Gain control over your data
Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.
Protect devices with powerful data encryption
Prevent unauthorized system access and render data unreadable in the event of device loss or theft by implementing full-disk encryption and access control. Encryption options include enterprise-grade drive encryption or native encryption management.
Ensure continual file, folder, and cloud protection
Automatically and transparently encrypt files and folders on the fly—before they move through and outside your organization. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
Microsoft Windows-Based EndpointsWindows 10Windows 8.1 (32-bit and 64-bit versions)Windows 8 (32-bit and 64-bit versions)Windows 7 (32-bit and 64-bit versions)Windows Vista (32-bit and 64-bit versions)Windows 2008 Server (32-bit and 64-bit versions)Windows XP (32-bit version only)Windows 2003 Server with Service Pack 1 (SP1) or higher (32-bit version only)
Apple Mac Laptop EndpointsMac OS X El CapitanMac OS X MavericksMac OS X Mountain LionMac OS X LionMac OS X Leopard (10.5.8 or later)
Hardware requirementsCPU: Pentium III (1 GHz or faster)CPU: Intel-based Mac laptop with 64-bit EFIRAM: 1 GB minimum
