Product guide

Table Of Contents
1
Introduction
McAfee Endpoint Encryption provides superior encryption across a variety of endpoints such as
desktops and laptops. The Endpoint Encryption solution uses strong access control with PreBoot
Authentication (PBA) and a NIST approved algorithm to encrypt data on endpoints. Encryption and
decryption are completely transparent to the end user and performed without hindering system
performance.
Administrators can easily implement and enforce security policies that control how sensitive data is
encrypted. These policies allow the administrators to monitor realtime events and generate reports to
demonstrate compliance with internal and regulatory requirements.
Endpoint Encryption has the advantage over other competitive encryption products, because it
engages encryption prior to loading of the Windows or Mac operating system, while data is at rest.
Contents
Comprehensive McAfee Endpoint Encryption
Purpose of this guide
Comprehensive McAfee Endpoint Encryption
This guide indicates Endpoint Encryption (EE) as the term to describe EEPC and EEMac. The content
that refers to the term Endpoint Encryption (EE) is applicable to both EEPC and EEMac. Procedures and
other details that are different for EEPC and EEMac setup are described in separate sections indicating
its individual product name, for example, EEPC or EEMac.
The McAfee Endpoint Encryption (EE) suite provides multiple layers of defense against data loss with
several integrated modules that address specific areas of risk. The suite provides protection for
individual computers, roaming laptops, MacBooks, and Mac desktops with 64bit Extensible Firmware
Interface (EFI).
This guide discusses these McAfee Endpoint Encryption solutions:
McAfee Endpoint Encryption for PC
McAfee Endpoint Encryption for Mac
Purpose of this guide
This guide suggests best practices for deployment and activation. It also discusses optimization and
maintenance before and after deployment.
When planning a large scale deployment of EEPC/EEMac 7.0 Patch 1, it is important to understand:
The features of McAfee
®
ePolicy Orchestrator
®
(McAfee ePO
)
The process of scaling the back end component
1
McAfee Endpoint Encryption 7.0 Patch 1 Software Best Practices Guide
7