McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.
Enhanced virtualization support — Enforces per-user policy for multiple sessions and VDIs, which allows flexibility and better control of the data flowing to the shared terminals.
Time-saving file tagging — Helps organizations set up time-saving policies based on location and application types. Security policies are preserved against file manipulation and transformation.
Ironclad IP protection — Protects product designs and source codes against intentional and unintentional data loss by enforcing clipboard protection for both "Copy From" and "Paste To" actions, in addition to the new screen capture (e.g., SnagIt) protection tools.
Streamlined data encryption — Integrates with McAfee Endpoint Encryption to automate content-aware data encryption policies.
Centralized Management Console — Leverages McAfee ePolicy Orchestrator (ePO) management console to define policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements.
Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers.
Ensure that your confidential information is protected throughout your network — on servers, in databases, and across endpoints.
Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements.
Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels — even when data is disguised.
Streamline management of your entire security risk management portfolio, including McAfee DLP Endpoint, via the centralized McAfee ePolicy Orchestrator (ePO) 4.5 console.
Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.
When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]
The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.
For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches. While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]
When social media really took off about 10 years ago, I think many of us assumed that it might just provide the perfect platform for true freedom of expression. But has this really happened? Are we sharing our convictions and opinions on our Twitter feeds and Facebook pages? Apparently not. A study conducted by The […]
The post Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared? appeared first on McAfee.
Being in love in the digital age is far more complicated than the ‘good ‘ole days’. The way we court and communicate has been turned on its head by the Internet. The fact that we can be ‘researched’ online, have our movements constantly analysed along with the constant obligation to be in touch with our […]