subscribe: Daily Newsletter

 

McAfee’s mobile protection in Leaders Quadrant

0 comments

Gartner has placed McAfee in the leaders' quadrant in its "Magic Quadrant for Mobile Data Protection," as published on 23 September 2008.
According to Gartner, vendors listed in the leaders' quadrant "have products that work well for Gartner clients in small and large deployments.


They have long-term road maps that follow and/or influence Gartner's vision of the developing needs of buyers in the market. Leaders make their competitors' sales staffs nervous and force competitors' technical staffs to follow their lead. Their Mobile Data Protection (MDP) products are well-known to clients, and they encounter little resistance in selling their products."
Factors contributing to a company's ability to execute include products and services, overall viability, sales and marketing execution and customer experience. Gartner evaluates a company's completeness of vision by considering in part its market understanding, sales and marketing strategy, offering or product strategy, business model and innovation.
"We believe our position in the leaders' quadrant further validates McAfee's commitment to delivering industry leading data protection technologies," says Jayson O'Reilly, regional director: Africa (acting) at McAfee South Africa. "Customers and partners rely on McAfee to provide defence-in-depth protection to ensure their data is protected against varying security threats which could disrupt business productivity."
McAfee Total Protection for Data software combines full-disk, file/folder and mobile device encryption together with endpoint Data Loss Prevention and device management/control functionality to provide integrated protection for data at the endpoint. Customers receive comprehensive monitoring and protection of all communication channels including corporate e-mail, personal e-mail, instant messaging, file transfer, P2P file sharing, Web mail and other applications.
McAfee Total Protection for Data software features:
* Centralised policy management and enforcement;
* Strong encryption for laptops, desktops and devices;
* Prevention of unauthorised access to data;
* Renders data useless in the event of loss or theft;
* Prevents accidental exposure of sensitive data;
* Prevents data loss without disrupting legitimate business activities;
* Enforces use of only authorised devices;
* Regulates what types of data can be transferred to external devices;
* Continuous monitoring of user behaviour;
* Auditing and reporting capabilities to provide total visibility; and
* Enforcement of regulatory and internal policy requirements.