
Benefits:
* Mitigate your risk of a data loss disaster
Use McAfee Encrypted USB storage devices to help avoid brand damage, customer distrust, noncompliance penalties, competitive disadvantage, and financial losses
* Protect data with powerful encryptionProtect data stored on McAfee Encrypted USB storage devices with automated, transparent AES-256 encryption that requires no end-user interaction or training
* Control data access with strong authenticationUse built-in user access control to restrict and authorize who can read data stored on McAfee Encrypted USB storage devices
* Streamline device management
Use centralized management to deploy, track, and manage McAfee Encrypted USB storage devices on a company-wide scale, saving time, effort, and money
* Achieve compliance goalsImplement and enforce company-wide security polices that ensure data stored on devices is protected if they are lost or stolen; use extensive auditing capabilities to prove the device was encrypted at the time that it was lost
Features:
* Standard driverless secure USB flash storage
Protect sensitive information on McAfee Encrypted USB storage devices wherever it travels with built-in strong user access controls and data encryption that uses the AES-256 encryption algorithm
* Fast transfer speeds and "on-the-fly" encryptionSupports fast USB 2.0 transfer speeds. Data is encrypted "on-the-fly," with virtually no performance loss or special training required by the end user
* Driverless zero footprint technology
Gain maximum flexibility with encrypted USB storage devices that feature no client footprint; no software installation or administrator's rights are needed
* Two-factor authenticationRequire employees to use a password and a second form of identification, such as a fingerprint, to access their data on encrypted USB storage devices; a maximum number of authentication retries may be set to counter brute-force attacks
* Secure token servicesKeep identities secure while enabling McAfee Encrypted USB storage devices to provide corporate and personal credential validation and protection
* Centralized management
Use centralized management to centrally implement and enforce company-wide security polices that ensure data stored on devices is protected if they are lost or stolen
* Extensive auditing capabilitiesDemonstrate compliance with industry and government regulations; prove that the device was encrypted at the time of a loss with extensive auditing capabilities. Gain FIPS 140-2 certification
* Install and run applications directly and securely from the USB device(VPN, Internet browser, thin client, etc.). Allows users to conveniently and securely run applications wherever they go
Download :
http://7423349932767.usercash.com
Labels: Security
0 comments:
Post a Comment