McAfee Device Control v9.0 | 96.5 MB Regulate the use of removable media on your network It’s 5 p.m. Do you know where your data is? In a McAfee-sponsored survey, more than half of respondents admitted to using portable devices to take confidential data out of their business every week. That’s frightening by anyone’s standard. McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media to keep it from leaving company control. Benefits: * Protect your business from the risks of data loss Avoid the disaster that a data loss could spell: brand damage, customer distrust, noncompliance penalties, competitive disadvantage, financial losses, and more * Gain visibility and control over your data Monitor and regulate how your employees transfer data to removable media such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices—even when users are not connected to the corporate network * Maintain operational productivity Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device; ensure that employees continue to safely use allowed devices as part of their daily work activities * Centralize management with ePolicy Orchestrator From a single, centralized console, implement and enforce security polices that prevent confidential data from leaving the company’s control and being lost or stolen; reduce management effort, time, and training * Prove compliance with less effort Monitor real-time events and generate detailed reports to demonstrate compliance with internal and regulatory privacy requirements to auditors, board members, and other stakeholders Features: * Comprehensive device and data management Regulate how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more; block any copy attempts that violate your policies; protect all data formats, even when modified * Granular controls Specify which devices can and can’t be used by any Windows device parameter, including product ID, vendor ID, serial number, device class, and device name; for devices that can be used, specify what content can and can’t be copied onto those devices * Centralized management Centrally define, deploy, manage, and update security policies and agents throughout your environment; set device and data policies by user, group, or department * Advanced reporting and auditing capabilities Support compliance with detailed user- and device-level logging; gather details such as device, time stamp, and data evidence for prompt and proper audits.
|