Antivirus and Antispyware Software
Site menu
News topics
My Internet Security [534]
My Anti-virus [959]
My Anti-spyware [419]
My Firewalls [120]
My Security [1105]
My Licensing Keys [50]
My Other [163]


Main » 2009 » March » 9 » McAfee Device Control v2.2




McAfee Device Control v2.2
1:18 PM


It’s 5 p.m. Do you know where your data is? In a McAfee-sponsored survey, more than half of respondents admitted to using portable devices to take confidential data out of their business every week. That’s frightening by anyone’s standard. McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

What value do you place on your customer data or the software that your company has been developing for the past 15 years? How do you know that the new programmer in engineering isn’t downloading your company’s entire software library to the USB drive she keeps on her keychain?

Data loss is one of the most widespread and costly security problems facing companies today. In fact, more than 75 percent of Fortune 1000 companies have fallen victim to accidental or malicious data loss. And the costs of data breaches are staggering. In 2007, the average cost was $6.3 million.1

McAfee Device Control protects data from leaving your company’s control and falling into the wrong hands through removable media, such as USB drives, MP3 players, CDs, and DVDs. It gives you the tools you need to monitor and control how users copy data onto these devices—regardless of whether they’re in the office, at home, or on the move.

Regulate the use of removable media on your network
It’s 5 p.m. Do you know where your data is? In a McAfee-sponsored survey, more than half of respondents admitted to using portable devices to take confidential data out of their business every week. That’s frightening by anyone’s standard. McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.

Benefits:

* Protect your business from the risks of data loss
Avoid the disaster that a data loss could spell: brand damage, customer distrust, noncompliance penalties, competitive disadvantage, financial losses, and more
* Gain visibility and control over your data
Monitor and regulate how your employees transfer data to removable media such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices—even when users are not connected to the corporate network
* Maintain operational productivity
Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device; ensure that employees continue to safely use allowed devices as part of their daily work activities
* Centralize management with ePolicy Orchestrator
From a single, centralized console, implement and enforce security polices that prevent confidential data from leaving the company's control and being lost or stolen; reduce management effort, time, and training
* Prove compliance with less effort
Monitor real-time events and generate detailed reports to demonstrate compliance with internal and regulatory privacy requirements to auditors, board members, and other stakeholders

Features:

* Comprehensive device and data management
Regulate how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more; block any copy attempts that violate your policies; protect all data formats, even when modified
* Granular controls
Specify which devices can and can't be used by any Windows device parameter, including product ID, vendor ID, serial number, device class, and device name; for devices that can be used, specify what content can and can't be copied onto those devices
* Centralized management
Centrally define, deploy, manage, and update security policies and agents throughout your environment; set device and data policies by user, group, or department
* Advanced reporting and auditing capabilities
Support compliance with detailed user- and device-level logging; gather details such as device, time stamp, and data evidence for prompt and proper audits

Size : 170 MB

Download part 1

Download part 2

Or

Mirror part 1

Mirror part 2

 
Category: My Security | Views: 597 | Added by: antivirus | Rating: 0.0/0 |

Total comments: 0

Only registered users can add comments.
[ Registration | Login ]


Login form
News calendar
«  March 2009  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031
Search
Statistics

Total online: 1
Guests: 1
Users: 0


Copyright MyCorp © 2024