McAfee Encrypted USB Hard Disk Non-Bio, 320GB USB-HDN2-320GBFG 데이터 시트
제품 코드
USB-HDN2-320GBFG
Data Sheet
Keep Data Safe and Secure
All the information copied onto McAfee Encrypted
USB devices is encrypted and can only be read by
authorized individuals. Built-in user access control
and strong hardware data encryption keeps sensi-
tive data secure wherever it travels.
authorized individuals. Built-in user access control
and strong hardware data encryption keeps sensi-
tive data secure wherever it travels.
Centralized Management
Deploying and managing portable storage devices
across an enterprise can be complex and expensive.
across an enterprise can be complex and expensive.
And, USB drives are typically not managed by the
IT organization, so they are often not covered by
company-wide security policies. The McAfee ePolicy
company-wide security policies. The McAfee ePolicy
Orchestrator
®
(McAfee ePO
™
) platform addresses
those issues by deploying and managing McAfee
Encrypted USB devices centrally from a single
console—which improves corporate security while
reducing total cost of ownership. Users simply
Encrypted USB devices centrally from a single
console—which improves corporate security while
reducing total cost of ownership. Users simply
initialize devices by plugging them into a McAfee
ePO-managed computer.
ePO-managed computer.
Strong Hardware Encryption
All data on McAfee Encrypted USB devices is
encrypted using the strongest, hardware-based,
industry-standard encryption algorithms available,
including AES-256, as well industry certifications,
industry-standard encryption algorithms available,
including AES-256, as well industry certifications,
such as Federal Information Processing Standards
(FIPS) 140-2. With built-in hardware encryption,
key generation, and certificate storage, encryption
keys can not be obtained or copied, as they never
(FIPS) 140-2. With built-in hardware encryption,
key generation, and certificate storage, encryption
keys can not be obtained or copied, as they never
leave the USB drive. Optionally, you can store other
encryption keys and/or public key infrastructure
encryption keys and/or public key infrastructure
(PKI) certificates.
To access data on McAfee Encrypted USB devices,
users must authenticate themselves using a
password or fingerprint, preventing unauthorized
access to data. For maximum security, two-
factor authentication can be used. If users have
forgotten a password or if they don’t have the
ability to perform biometric authentication,
they can easily regain access to the data via a
centralized password reset or self-rescue enabled
by McAfee ePO software.
password or fingerprint, preventing unauthorized
access to data. For maximum security, two-
factor authentication can be used. If users have
forgotten a password or if they don’t have the
ability to perform biometric authentication,
they can easily regain access to the data via a
centralized password reset or self-rescue enabled
by McAfee ePO software.
Demonstrate Regulatory Compliance
Because they are integrated with the McAfee ePO
management console, McAfee Encrypted USB
devices support your compliance efforts, from
corporate security policies to industry-specific
regulations to data privacy legislation. You can
prove that the data on a stolen or lost USB device
was encrypted, and you can run reports that detail
data access and USB usage for auditing purposes.
management console, McAfee Encrypted USB
devices support your compliance efforts, from
corporate security policies to industry-specific
regulations to data privacy legislation. You can
prove that the data on a stolen or lost USB device
was encrypted, and you can run reports that detail
data access and USB usage for auditing purposes.
Key Features
•
Implement strong access control for removable
USB storage and encrypt data in hardware
using Advanced Encryption Standard (AES-256)
hardware encryption
USB storage and encrypt data in hardware
using Advanced Encryption Standard (AES-256)
hardware encryption
McAfee Encrypted USB
Protect mobile data with McAfee
®
Encrypted USB devices
High capacity, small form factor USB storage drives enable workers to transport large
amounts of confidential company data anywhere. And, well-intentioned employees
are often unaware of the significant security risks and costs that could impact
their organization if the drives are lost or stolen. What’s more, the vast majority of
USB drives are not controlled or managed by the IT department or covered by the
organization’s security policy, increasing the risk of unauthorized access, data loss,
and regulatory noncompliance. Extending the centralized corporate security policy
to control and manage USB drives is essential for data security in today’s mobile
environments.
amounts of confidential company data anywhere. And, well-intentioned employees
are often unaware of the significant security risks and costs that could impact
their organization if the drives are lost or stolen. What’s more, the vast majority of
USB drives are not controlled or managed by the IT department or covered by the
organization’s security policy, increasing the risk of unauthorized access, data loss,
and regulatory noncompliance. Extending the centralized corporate security policy
to control and manage USB drives is essential for data security in today’s mobile
environments.
Key Advantages
•
Comply with corporate security
policies, data privacy legislation, and
industry regulations through the use
of hardware-encrypted USB devices
policies, data privacy legislation, and
industry regulations through the use
of hardware-encrypted USB devices
•
Provide data mobility without
compromising security policies
compromising security policies
•
Track and manage encrypted
USB devices company-wide using
the McAfee ePolicy Orchestrator
platform for automated security
reporting, auditing, monitoring,
and policy administration
the McAfee ePolicy Orchestrator
platform for automated security
reporting, auditing, monitoring,
and policy administration
•
Control data access with two- or
three-factor authentication
three-factor authentication
•
Secure data with industry-leading
encryption algorithms and valida-
tions, such as AES-256 and FIPS 140-2,
for strong protection
encryption algorithms and valida-
tions, such as AES-256 and FIPS 140-2,
for strong protection