McAfee Encrypted USB USB-NBIO-4GBPA Hoja De Datos
Los códigos de productos
USB-NBIO-4GBPA
Data Sheet
Key Advantages
Comply with corporate security
•
policies, data privacy legislation,
and industry regulations through
use of encrypted USB devices
Provide data mobility without
and industry regulations through
use of encrypted USB devices
Provide data mobility without
•
compromising security policies
Track and manage encrypted USB
•
storage devices company-wide using
the McAfee ePolicy Orchestrator
the McAfee ePolicy Orchestrator
(ePO) for automated security
reporting, auditing, monitoring,
and policy administration
Control data access with two-factor
reporting, auditing, monitoring,
and policy administration
Control data access with two-factor
•
authentication
Secure data with industry-leading
Secure data with industry-leading
•
encryption algorithms and
certifications, such as AES-256 and
FIPS 140-2, for strong protection
certifications, such as AES-256 and
FIPS 140-2, for strong protection
Protect your assets and your brand
USB drives, because of their small size and
portability, are great for storage, but they are
also a security officer’s biggest nightmare. Each
day, individuals walk out of their offices with
large amounts of sensitive corporate data stored
on portable USB drives that are tucked into their
pockets or briefcases, and they are unaware of the
security risk they pose to their organization if the
drives are lost or stolen.
portability, are great for storage, but they are
also a security officer’s biggest nightmare. Each
day, individuals walk out of their offices with
large amounts of sensitive corporate data stored
on portable USB drives that are tucked into their
pockets or briefcases, and they are unaware of the
security risk they pose to their organization if the
drives are lost or stolen.
With McAfee Encrypted USB devices, the
information copied onto or transported on these
devices is encrypted and can only be read by
authorized individuals. With built-in user access
control and strong data encryption, McAfee
Encrypted USB keeps sensitive data secure
wherever it travels. Plus, user identities remain safe
devices is encrypted and can only be read by
authorized individuals. With built-in user access
control and strong data encryption, McAfee
Encrypted USB keeps sensitive data secure
wherever it travels. Plus, user identities remain safe
from prying eyes, thanks to integrated credentials
protection and validation.
Centralized Management with award-winning
McAfee ePolicy Orchestrator
McAfee ePolicy Orchestrator
Deploying and managing portable storage devices
across an enterprise can be extremely complex and
expensive for an organization. Because USB drives
are typically not managed by the IT organization,
they are not covered by company-wide security
policies. Too often, individuals copy intellectual
property or other proprietary information onto
USB drives in the clear—data that normally
would be encrypted when attached to an email
across an enterprise can be extremely complex and
expensive for an organization. Because USB drives
are typically not managed by the IT organization,
they are not covered by company-wide security
policies. Too often, individuals copy intellectual
property or other proprietary information onto
USB drives in the clear—data that normally
would be encrypted when attached to an email
or stored on a laptop. Centralized management
with McAfee ePolicy Orchestrator
with McAfee ePolicy Orchestrator
®
(ePO
™
) enables
corporations to overcome these challenges by
making it easy to get the encryption you need.
making it easy to get the encryption you need.
You can deploy and manage McAfee Encrypted
USB drives on an enterprise-wide scale, with
virtually no impact on the existing IT infrastructure.
virtually no impact on the existing IT infrastructure.
The combination of ePolicy Orchestrator and
our range of encrypted USB devices provides
centralized management and deployment from
a single console, improving corporate security
while reducing total cost of ownership. The ePO
management interface lets you initialize any
McAfee encrypted USB device simply by plugging
centralized management and deployment from
a single console, improving corporate security
while reducing total cost of ownership. The ePO
management interface lets you initialize any
McAfee encrypted USB device simply by plugging
the device into any ePO-managed machine with its
unique “no-touch” initialization capabilities.
unique “no-touch” initialization capabilities.
Keep data safe and secure with
strong encryption
strong encryption
To access data on McAfee Encrypted USB devices,
users must authenticate themselves using a
password or fingerprint, preventing unauthorized
access to data. For maximum security, two-
factor authentication can be used. If users have
forgotten a password or if they don’t have the
ability to perform biometric authentication. They
can easily regain access to the data via a centralized
password reset or self rescue through ePO.
password or fingerprint, preventing unauthorized
access to data. For maximum security, two-
factor authentication can be used. If users have
forgotten a password or if they don’t have the
ability to perform biometric authentication. They
can easily regain access to the data via a centralized
password reset or self rescue through ePO.
With built-in encryption, key generation, and
certificate storage, encryption keys can never be
McAfee Encrypted USB
Extend security to your mobile environment with
McAfee
McAfee
®
Encrypted USB devices
Organizations today store sensitive data on a variety of devices, including small form-
factor USB flash drives that fit in the palm of your hand. While the physical size of
these drives continues to get smaller, their storage capacity is increasing, making them
factor USB flash drives that fit in the palm of your hand. While the physical size of
these drives continues to get smaller, their storage capacity is increasing, making them
capable of storing a large amount of mission-critical information—and making them
a significant security risk if the device is lost or stolen. What’s more, the vast majority
of these USB drives are not controlled or managed by the IT department or covered by
the organization’s security policy, increasing the risk of unauthorized access, data loss,
and regulatory noncompliance. Extending the centralized corporate security policy to
control and manage USB drives is essential for today’s mobile environments.
a significant security risk if the device is lost or stolen. What’s more, the vast majority
of these USB drives are not controlled or managed by the IT department or covered by
the organization’s security policy, increasing the risk of unauthorized access, data loss,
and regulatory noncompliance. Extending the centralized corporate security policy to
control and manage USB drives is essential for today’s mobile environments.