SlideShare a Scribd company logo
1 of 2
Download to read offline
Data Sheet McAfee Anti-Theft File Protection




Anti-Theft File Protection
Total Privacy and Theft Protection for Valuable Files

With the growing number of stolen and lost PCs, along with data loss and identity
theft cases, it’s clear everyone needs extra protection for their personal and confiden-
tial files. You need McAfee® Anti-Theft File Protection to secure your valuable files.
It is simple to install and uses the industry’s leading, innovative technology.

Easy to Use                                          McAfee Anti-Theft security provides easy-to-use
McAfee Anti-Theft software is fast and easy          protection for your financial documents and
to install and use, allowing you to quickly secure   other important files at home or work against
your files and focus on other activities.            thieves and hackers. It also allows you to keep
                                                     sensitive files private even if you share a PC.
Powerful Protection                                  Using powerful advanced technology, it lets
Using advanced technology, McAfee helps              you secure files in password protected vaults.
keep you a step ahead of ever-evolving
threats, helping ensure that you have the            McAfee Anti-Theft protection enables you to
best protection possible.                            securely transfer files using an USB drive. It
                                                     works with all major PC security software and
The Trusted Security Provider                        provides you with an additional layer of protec-
McAfee has been the leading computer security        tion, helping protect your privacy, your identity,
company for nearly 20 years. We are dedicated        and your finances.
to protecting you and your computer from
threats so you can get the most out of your PC
and the Internet without having to worry.

Simplified Security
You can easily secure your financial documents,
tax records and other important files in password-
protected ”digital vaults.” You can reset your
password in case you forget it.
Data Sheet McAfee Anti-Theft File Protection




                                            Product Features & Benefits                                                      The McAfee Advantage
                                            •   Secure your files using strong file                                          McAfee’s security products use award-winning
                                                encryption —256-bit Advanced Encryption                                      technology, are easy to install, and come with
                                                Standard (AES) technology protects your                                      unlimited email and chat assistance. With con-
                                                personal documents and identity against                                      tinuous and automatic updates, McAfee helps
                                                thieves and hackers                                                          ensure that you always have the best protection
                                            •   Easily transfer and hide files—Move files                                    to combat the ever-evolving threats.
                                                into a vault and keep them private even if
                                                you share the computer with others
                                            •   Create multiple vaults on your PC and
                                                USB drive—Set up as many secure areas as
                                                you want, so every user can have their own
                                                private space
                                            •   Password protect your vault—Create a
1
    McAfee Anti-Theft File Protection
    works independently of other
                                                password for your vault and use the password
    PC security software but is not             reset option if needed
    guaranteed to be compatible
                                            •   Extra protection—Provides an additional
    with future versions of other
    PC security software.                       layer of protection over your basic PC security

    Note: An Internet connection is
                                            •   Use with other computer security
    required for installation and activa-       software1— A great addition to your current
    tion of this security software.             PC security software



                                                                What You Want to Do                                                     How McAfee Makes It Possible

                                                Keep financial records, personal information,                                    Allows you to place sensitive files into
                                                and business documents safe on your PC                                           a secure digital vault

                                                                                                                                 Helps you to easily create one or more
                                                 Quickly set up a vault                                                          personal vaults with a convenient password
                                                                                                                                 reset option

                                                                                                                                 Allows you to quickly create a vault
                                                 Securely transfer files between PCs
                                                                                                                                 on a USB drive

                                                 Ensure my data will be protected at home                                        Helps secure files using advanced technology
                                                 and at work                                                                     so you are protected

                                                                                                                                 McAfee Anti-Theft software works with other
                                                 Use with your PC security software                                              PC security software from companies like
                                                                                                                                 Symantec, Trend Micro, Microsoft and others




                                            System Requirements
                                            Windows XP (32-Bit) with Service Pack 1 (SP1) or higher,                         *
                                                                                                                                   Must meet Windows Vista Operating System requirements
                                            Windows Vista (32-Bit)*                                                          **
                                                                                                                                   Only for the product. This does not include space required
                                            Pentium-compatible processor 500 MHz or higher                                         to create vaults
    McAfee, Inc.
                                            256 MB RAM or higher.                                                            ***
                                                                                                                                   Internet connection required for product activation
    3965 Freedom Circle                     800 X 600 or higher resolution.                                                        and updates
    Santa Clara, CA 95054                   10MB initial Hard Disk Space **
                                            Internet connection***
    888.847.8766
    www.mcafee.com




                                            McAfee and/or additional marks herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries.
                                            McAfee Red is in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole
                                            property of their respective owners. ® 2008 McAfee, Inc. All Rights Reserved. 8/08

More Related Content

What's hot

The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec ConundrumVirtualTal
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 
IBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIsabel Sanz
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheettmaliyil
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your DesktopsScriptLogic
 
IT Security for Nonprofits 101
IT Security for Nonprofits 101IT Security for Nonprofits 101
IT Security for Nonprofits 101seanericwatson
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Lumension
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Symantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet yonifine
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 

What's hot (20)

The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
L49 slides
L49 slidesL49 slides
L49 slides
 
IBM Cloud Data Encryption Services
IBM Cloud Data Encryption ServicesIBM Cloud Data Encryption Services
IBM Cloud Data Encryption Services
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Emc lifeline
Emc lifelineEmc lifeline
Emc lifeline
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Winxp
WinxpWinxp
Winxp
 
Microsoft intune
Microsoft intuneMicrosoft intune
Microsoft intune
 
8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops8 Sure-Fire Ways to Manage Your Desktops
8 Sure-Fire Ways to Manage Your Desktops
 
IT Security for Nonprofits 101
IT Security for Nonprofits 101IT Security for Nonprofits 101
IT Security for Nonprofits 101
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Symantec Deepens Encryption Offerings
Symantec Deepens Encryption OfferingsSymantec Deepens Encryption Offerings
Symantec Deepens Encryption Offerings
 
Egress Switch Datasheet
Egress Switch Datasheet Egress Switch Datasheet
Egress Switch Datasheet
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 

Similar to Anti theft file protection

Securus Swiss Cloud Storage Solutions
Securus Swiss Cloud Storage SolutionsSecurus Swiss Cloud Storage Solutions
Securus Swiss Cloud Storage Solutionssecurusvault
 
SecurusVault Swiss Data Backup overview
SecurusVault Swiss Data Backup overviewSecurusVault Swiss Data Backup overview
SecurusVault Swiss Data Backup overviewsecurusvault
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secureFort Rucker FRSA
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Securermpall
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices DatasheetsScientia Groups
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheetsfrankold
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Private Cloud
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Exclusive Networks ME
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewSteven Russo
 

Similar to Anti theft file protection (20)

Securus Swiss Cloud Storage Solutions
Securus Swiss Cloud Storage SolutionsSecurus Swiss Cloud Storage Solutions
Securus Swiss Cloud Storage Solutions
 
SecurusVault Swiss Data Backup overview
SecurusVault Swiss Data Backup overviewSecurusVault Swiss Data Backup overview
SecurusVault Swiss Data Backup overview
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 
201104 Best Practices For Keeping Your Home Network Secure
201104   Best Practices For Keeping Your Home Network Secure201104   Best Practices For Keeping Your Home Network Secure
201104 Best Practices For Keeping Your Home Network Secure
 
NSA Best Practices Datasheets
NSA Best Practices DatasheetsNSA Best Practices Datasheets
NSA Best Practices Datasheets
 
Best practices datasheets
Best practices datasheetsBest practices datasheets
Best practices datasheets
 
Ib services marketing1
Ib services marketing1Ib services marketing1
Ib services marketing1
 
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
Microsoft Forefront - Help Securely Enable Business by Managing Risk and Empo...
 
Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook Protect Your Sensitive Data with Gemalto Guidebook
Protect Your Sensitive Data with Gemalto Guidebook
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
 
Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic Bloombase transparent at-rest data encryption security for Dell EqualLogic
Bloombase transparent at-rest data encryption security for Dell EqualLogic
 
CertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed OverviewCertainSafe MicroTokenization Technology Detailed Overview
CertainSafe MicroTokenization Technology Detailed Overview
 

Anti theft file protection

  • 1. Data Sheet McAfee Anti-Theft File Protection Anti-Theft File Protection Total Privacy and Theft Protection for Valuable Files With the growing number of stolen and lost PCs, along with data loss and identity theft cases, it’s clear everyone needs extra protection for their personal and confiden- tial files. You need McAfee® Anti-Theft File Protection to secure your valuable files. It is simple to install and uses the industry’s leading, innovative technology. Easy to Use McAfee Anti-Theft security provides easy-to-use McAfee Anti-Theft software is fast and easy protection for your financial documents and to install and use, allowing you to quickly secure other important files at home or work against your files and focus on other activities. thieves and hackers. It also allows you to keep sensitive files private even if you share a PC. Powerful Protection Using powerful advanced technology, it lets Using advanced technology, McAfee helps you secure files in password protected vaults. keep you a step ahead of ever-evolving threats, helping ensure that you have the McAfee Anti-Theft protection enables you to best protection possible. securely transfer files using an USB drive. It works with all major PC security software and The Trusted Security Provider provides you with an additional layer of protec- McAfee has been the leading computer security tion, helping protect your privacy, your identity, company for nearly 20 years. We are dedicated and your finances. to protecting you and your computer from threats so you can get the most out of your PC and the Internet without having to worry. Simplified Security You can easily secure your financial documents, tax records and other important files in password- protected ”digital vaults.” You can reset your password in case you forget it.
  • 2. Data Sheet McAfee Anti-Theft File Protection Product Features & Benefits The McAfee Advantage • Secure your files using strong file McAfee’s security products use award-winning encryption —256-bit Advanced Encryption technology, are easy to install, and come with Standard (AES) technology protects your unlimited email and chat assistance. With con- personal documents and identity against tinuous and automatic updates, McAfee helps thieves and hackers ensure that you always have the best protection • Easily transfer and hide files—Move files to combat the ever-evolving threats. into a vault and keep them private even if you share the computer with others • Create multiple vaults on your PC and USB drive—Set up as many secure areas as you want, so every user can have their own private space • Password protect your vault—Create a 1 McAfee Anti-Theft File Protection works independently of other password for your vault and use the password PC security software but is not reset option if needed guaranteed to be compatible • Extra protection—Provides an additional with future versions of other PC security software. layer of protection over your basic PC security Note: An Internet connection is • Use with other computer security required for installation and activa- software1— A great addition to your current tion of this security software. PC security software What You Want to Do How McAfee Makes It Possible Keep financial records, personal information, Allows you to place sensitive files into and business documents safe on your PC a secure digital vault Helps you to easily create one or more Quickly set up a vault personal vaults with a convenient password reset option Allows you to quickly create a vault Securely transfer files between PCs on a USB drive Ensure my data will be protected at home Helps secure files using advanced technology and at work so you are protected McAfee Anti-Theft software works with other Use with your PC security software PC security software from companies like Symantec, Trend Micro, Microsoft and others System Requirements Windows XP (32-Bit) with Service Pack 1 (SP1) or higher, * Must meet Windows Vista Operating System requirements Windows Vista (32-Bit)* ** Only for the product. This does not include space required Pentium-compatible processor 500 MHz or higher to create vaults McAfee, Inc. 256 MB RAM or higher. *** Internet connection required for product activation 3965 Freedom Circle 800 X 600 or higher resolution. and updates Santa Clara, CA 95054 10MB initial Hard Disk Space ** Internet connection*** 888.847.8766 www.mcafee.com McAfee and/or additional marks herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red is in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. ® 2008 McAfee, Inc. All Rights Reserved. 8/08