McAfee

McAfee Trellix Complete Data Protection Basic

MPN: CDBCDE-AA-AA
SKU: MCSTSSAP30
Security Software

Recommended For You

Beta

Frequently bought together

Beta

Buy it with

Beta

Specifications

Operating System
Windows, MAC
Duration
1 Year
Brand
McAfee
Number Of Users
1 User
Product Type
E-License

Description

    McAfee Complete Data Protection Features
Enterprise-grade drive encryption
  • Automatically encrypts entire devices without requiring user action or training or impacting system resources
  • Identifies and verifies authorized users using strong multifactor authentication
  • Supports Intel Software Guard Extensions (Intel SGX)
  • Compatible with third-party credential providers
  • In-place upgrade support for Windows 10 Anniversary Update


  • Removable media encryption
  • Automatic, on-the-fly encryption for virtually any mobile storage device, company issued or not
  • Encrypt or block writes to removable media at VDI workstations
  • Access encrypted data anywhere, without the need for any additional software installation or local administrative rights on the device host


  • File, folder, and cloud storage encryption
  • Keep files and folders secure wherever they are saved, including local hard disks, file servers, removable media, and cloud storage such as Box, Dropbox,Google Drive, and Microsoft OneDrive.


  • Manage native encryption on Macs and Windows
  • Manage FileVault on any Mac hardware that can run OS X Mountain Lion, Mavericks, Yosemite, and El Capitan directly from MVISION ePO or McAfee ePO software.
  • Manage BitLocker on Windows 7, 8, and 10 systems directly from McAfee ePO software, without the need for a separate Microsoft BitLocker Management and Administration (MBAM) server.
  • Report compliance in various reports and dashboards in MVISION ePO or McAfee ePO software.


  • Centralized management console
  • Use the McAfee ePO software infrastructure management to manage full-disk, file and folder, and removable media encryption; control policy and patch management; recover lost passwords; and demonstrate regulatory compliance.
  • Synchronize security policies with Microsoft Active Directory, Novell NDS, PKI, and others.
  • Prove devices are encrypted with extensive auditing capabilities.
  • Log data transactions record such information as sender, recipient, timestamp, data evidence, date and time of last successful login, date and time last update received, and whether the encryption was successful.
  • Ratings & Reviews

    Product Ratings

    0
    No review for this product yet
    5
    0
    4
    0
    3
    0
    2
    0
    1
    0

    Product Reviews (0)

    No review for this product yet
    chevron-leftAlertBrowse fileDownload fileFileImagePdfWordTextExcelPowerpointArchiveCsvAudioVideoSpinnerCalendarSort NoneSort ASCSort DESCReturn arrowMinusVisibleVisibleexternal link