Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses.
According to a Ponemon Institute report, 7% of all corporate laptops will be lost or stolen sometime during their useful life. The rapid proliferation of mobile devices with large storage capacities and Internet access is opening up even more channels for data loss or theft, so protecting sensitive, proprietary, and personally identifiable information must be a top priority.
Trellix® Complete Data Protection addresses all of these concerns and many more.
Data Loss Prevention for Greater Control |
Enterprise-Grade Drive Encryption
|
Preventing data loss at the endpoint begins with improving visibility and control over your data, even when it is disguised. |
Uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, VDI workstations, laptops, USB drives, CD/DVDs, and more. |
Removable Media, File and Folder, and Cloud Storage Encryption |
Management of Native Encryption |
Specific files and folders are always encrypted, regardless of where data is edited, copied, or saved. |
Management of native encryption allows you to manage the native encryption functionality offered by Apple FileVault on OS X and Microsoft BitLocker on Windows platforms Trellix Complete Data Protection—Advanced 2 Data Sheet directly from Trellix® ePolicy Orchestrator® (McAfee ePO™) software. |
Gain control over your data
Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.
Protect devices with powerful data encryption
Prevent unauthorized system access and render data unreadable in the event of device loss or theft by implementing full-disk encryption and access control. Encryption options include enterprise-grade drive encryption or native encryption management.
Ensure continual file, folder, and cloud protection
Automatically and transparently encrypt files and folders on the fly—before they move through and outside your organization. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.