McAfee Device Control & Encryption
Device Control & Encryption course (McAfee Endpoint Encryption) - (SafeBoot® Encryption)
Secure data on PCs, laptops, tablets and PDAs
McAfee 1 Day Device Control and Encryption course has been created to assist security professionals in securing their mobile workforce and preventing data loss, unauthorised access and information leakage from their organisation.
McAfee Device Control & Encryption Details Click to expand
Device Control Component
- Introduce Device Control and discuss its use
- Highlight the product prerequisites
- Describe its concepts and roles
- Install and Configure Device Control extension(s) and policies in McAfee ePO
- Overview the Device Control (DLP) console
- Install and configure the Device Control (DLP) console
- Configure device monitoring and management
- Configure device classification and management
- Introduce analysis of discovered devices and classified data
- Configure device management and data leakage rules
- Discuss and implement deployment techniques
Drive Encryption Component
- Introduce the latest version of Drive Encryption and discuss its uses
- Highlight the product prerequisites
Strong encryption and access control
- Protect against unauthorized access
and data exposure, with powerful
device encryption and strong preboot
- Transparently encrypt data “on-thefly,”
with no end-user interaction or
- Ensure files and folders remain
encrypted wherever they are saved or
Internal and external security compliance
Enforce mandatory, company-wide security policies
Demonstrate compliance with data privacy legislation
Control which applications users may access
Easy centralized management and lower TCO
Gain extensive centralized management capabilities
Synchronize and integrate the solution with Active Directory, Novell, LDAP, and PKI
Enjoy single sign-on and support for popular smart cards and tokens
Take advantage of support for all common languages, keyboards, and
Windows operating systems
Protect your assets and your brand
Loss of confidential data, including customer data, employee records, intellectual property, and
business documents has become a pervasive problem for companies worldwide.
According to a 2007 survey conducted by the Ponemon Institute, 85 percent of respondents said their businesses had experienced a data security breach.2 Also reported by the Ponemon Institute, the average cost
of a data breach was $6.3 million.3
Attain maximum data security with full-disk encryption
The protection of data assets is a primary issue facing today’s organizations. Protect your company’s mission-critical data with McAfee Endpoint Encryption. The solution uses strong access control with preboot authentication and government certified algorithms to encrypt data on endpoint devices, including desktops, laptops, Tablet PCs, smartphones, and PDAs.
Encryption and decryption are transparent to the user and performed “on-the-fly,” with virtually no performance degradation. McAfee Endpoint Encryption seamlessly integrates with existing enterprise systems and provides operational efficiency that ensures low total-cost-of-ownership.
Protect files and folders wherever they go
Control what files or folders are encrypted. McAfee Endpoint Encryption allows administrators to specify that the contents of certain folders, files created by particular applications, or files of a certain type be encrypted. Groups of users are granted access rights to particular files and folders, and securely share files across the network.
No matter where files are saved and transferred, data remains encrypted using Persistent Encryption Technology™. If an unauthorized user tries to save a file that is viewable on a company laptop to an
unapproved storage device, that user will walk away with an encrypted and unreadable file.
Achieve compliance and lower TCO
Prevent loss of data wherever your data goes and achieve regulatory compliance with a full range of security and encryption solutions all managed from one central console. McAfee Endpoint Encryption provides central management capabilities including administration, central deployment, remote upgrades, auditing, mandatory security policy management, a scripting tool, hot revocation, recovery, synchronization, and more. Extensive auditing capabilities prove the device was encrypted at the time of loss or theft, demonstrating compliance.
Mandatory security policies can be transparently enforced by administrators. McAfee Endpoint Encryption lso supports single sign-on and secure offline user recovery.