Encrypted USB Hard Disk, 80 GB
Avoid a Moving Liability
Organizations today store sensitive data on a variety of devices, including small form-factor USB flash drives that fit in the palm of someone’s hand. While the physical size of these drives continues to decrease, their storage capacity is increasing, making them capable of storing a wide variety of mission-critical information—and of becoming a significant security risk if the device is lost or stolen. What’s more, the vast majority of these USB drives are not controlled or managed by the IT department—or covered by the organization’s security policy—increasing the risk of unauthorized access, data loss, and regulatory noncompliance. With McAfee Encrypted USB devices, the information copied and transported onto these devices is encrypted and can only be read by authorized individuals.
Centralized Management with Award-winning McAfee ePolicy Orchestrator
Extending the centralized corporate security policy to control and manage USB drives is essential for today’s mobile environments. With centralized management, you centrally define and enforce securities policies to ensure data stored on devices remains protected in case they are lost or stolen. You can deploy and manage any number of Encrypted USB storage devices and users. The combination of McAfee’s ePolicy Orchestrator® (ePO™) and range of encrypted USB devices provide centralized management and deployment from a single console, improving corporate security while reducing total-cost-of-ownership. In addition, you leverage your existing Microsoft Active Directory implementation to match users and Encrypted USB devices.
Strong access Control and Encryption
Data is automatically encrypted "on the fly" with virtually no impact on performance. Because encryption is done transparently, there is no interaction or training necessary. Each Encrypted USB storage device is capable of supporting multiple end users. Users maintain their own secure, password-protected partitions. Administrators can also create an optional "public area" in which to store information that doesn't need to be encrypted.
Prove Compliance
Extensive auditing capabilities and reporting tools allow you to meet your compliance goals and prove that devices were encrypted. Security policies are enforced, so that data stored on the device is protected if lost or stolen.