McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention

DLP para un mundo dinámico

Próximos pasos:

Descripción general

McAfee Total Protection for Data Loss Prevention (DLP) salvaguarda la propiedad intelectual y garantiza el cumplimiento de las normativas al proteger los datos confidenciales donde quiera que residan: in situ, en la nube o en los endpoints. McAfee DLP se entrega a través de dispositivos de bajo mantenimiento (físicos o virtuales) y de la plataforma McAfee ePolicy Orchestrator (ePO) para optimizar el despliegue, la administración, las actualizaciones y la generación de informes.

Despliegue rápido: la tecnología Capture exclusiva y no invasiva permite que las organizaciones elaboren y desplieguen las directivas de protección frente a pérdidas de datos con mayor rapidez y precisión, sin tener que hacer suposiciones ni pruebas y errores.

Gestión de directivas simplificada : el etiquetado flexible de archivos ayuda a las organizaciones a establecer directivas que ahorran tiempo en función de la ubicación y de los tipos de aplicación. La tecnología de clasificación de datos categoriza grandes cantidades de datos de forma que solo se examinan y corrigen los archivos pertinentes.

Protección de datos proactiva: es la única solución DLP que registra todos los datos que salen de las redes y da visibilidad del uso que se hace de la información confidencial. Permite identificar y corregir procesos empresariales que se han violado y, por tanto, se reduce el riesgo de que se produzcan fugas de información en el futuro.

Demostraciones y tutoriales

Demostraciones

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Tutoriales

Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.

Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.

Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.

In this video you will learn about performing traffic analysis in McAfee DLP. You will learn about the various device utilities, and how to interpret network statistic and set up capture filters. After viewing the tutorial, you will know how to baseline and tune a McAfee DLP Monitor appliance.

In this tutorial, you will learn about the challenges faced by data growth and an approach to effective data classification. After viewing this video, you will know how to perform data classification with McAfee Data Loss Prevention.

In this tutorial, you will learn about incidents and incident management in McAfee DLP. After this tutorial, you will be familiar with the McAfee DLP incident dashboard and will know how to configure it toenable easy ongoing incident management.

In this tutorial, you will learn how to use basic and advanced search capabilities in captured data, a unique feature of McAfee DLP. You will learn how to leverage captured data to help optimize your DLP policies and protections.

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

In this tutorial, you will learn specifics about the DocReg concept in McAfee DLP. After this tutorial, you will know what the DocReg concept is used for and how to effectively use it for fingerprinting data.

In this tutorial, you will learn how to use location based tagging in McAfee DLP in order to prevent critical and sensitive data from being leaked out of your organization.

After viewing this video, you will know how to perform LDAP integration and how to use Role-Based Access Control (RBAC) are and how to create them in McAfee Data Loss Prevention.

In this tutorial you will learn about Concepts in McAfee DLP. After viewing the tutorial, you will know what concepts are, how to create them and how to test their effectiveness.

In this tutorial you will learn about policies in McAfee DLP. After viewing the tutorial, you will know to to create policies and how to test them.

Experiencias de los clientes

Dongfeng Nissan Passenger Vehicle Co., Ltd. (English)

China-based Dongfeng Nissan protects its critical information and data from internal and external risks with McAfee data protection and network security solutions.

Aspectos destacados
  • Protected intellectual property

Informa (English)

Informa standardized its security with a single vendor, reducing costs and increasing protection against various types of malware.

Aspectos destacados
  • Gained fast ROI through solid protection, reasonable pricing, and reduced internal costs
  • Created an environment of easy deployment and administration
  • Protected against malware with augmented malware detection abilities
  • Assured that the entire network is protected
  • Increased control over the security infrastructure

Sutherland Global Services (English)

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

Aspectos destacados
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

Módulos

McAfee DLP Manager
McAfee DLP Manager

McAfee DLP Manager ahorra tiempo y dinero al proporcionarle un control flexible, centralizado y delegado de McAfee DLP. Se integra fácilmente con la plataforma McAfee ePolicy Orchestrator (ePO) para administrar y supervisar toda la empresa.

McAfee DLP Discover
McAfee DLP Discover

McAfee DLP Discover localiza la información confidencial, aunque se desconozca el lugar en el que se encuentra. Con tecnología avanzada de exploración de la red, McAfee Network DLP Discover busca sistemas basándose en el segmento de la red local, el intervalo de direcciones IP, el grupo de redes y muchos otros criterios fáciles de definir. La información almacenada en bases de datos se puede buscar sin la ayuda de un administrador de base de datos. Programe análisis para que se ejecuten a intervalos que se adapten a su flujo de trabajo y rastree automáticamente los resultados para aumentar la precisión de la protección de los datos.

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor permite buscar, hacer seguimiento y proteger a lo largo del tiempo la información confidencial de cualquier aplicación o ubicación, en cualquier formato, protocolo o puerto. Unas funciones analíticas sin rival facilitan la elaboración precisa de directivas y la respuesta rápida y flexible.

McAfee DLP Prevent
McAfee DLP Prevent

McAfee DLP Prevent ayuda a que las directivas de seguridad en materia de manejo de datos se apliquen a la información que sale de los límites de la red. Se integra con la mayoría de las tecnologías de seguridad del gateway de Internet que se comercializan para el correo electrónico, la Web, la mensajería instantánea y otras aplicaciones de red.

McAfee DLP Endpoint
McAfee DLP Endpoint

McAfee DLP Endpoint ofrece una protección inigualable frente al robo y la divulgación accidental de información confidencial. Esta protección opera en las redes, las aplicaciones y los dispositivos de almacenamiento extraíbles.

McAfee Device Control
McAfee Device Control

McAfee Device Control le ayuda a vigilar y a restringir los datos que se copian a dispositivos y soportes de almacenamiento extraíbles para impedir que escapen al control de la empresa.

Noticias y acontecimientos

Recursos

Fichas técnicas

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee DLP Endpoint

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Prevent

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Discover

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Manager

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Monitor

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee Solution Services — Enhanced Services DLP (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Infographics

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Informes

Best Practices for Data Loss Prevention: A Process, Not a Technology (English)

Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. This latest Gartner report identifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.

Implementing and Managing a Data Loss Prevention Solution (English)

Implementing and managing DLP isn’t nearly as difficult as many security professionals expect. Over the 10 plus years Securosis has covered the technology — talking with hundreds of DLP users — countless tips, tricks, and techniques have been collected for streamlined and effective deployments and have been compiled into straightforward processes in this report to ease most common pain points.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

Libros blancos

Data Loss Prevention Best Practices for Healthcare (English)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Resúmenes de soluciones

McAfee Total Protection for Data Loss Prevention (English)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

McAfee Data Loss Prevention for Healthcare (English)

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

McAfee Data Protection for Energy (English)

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

McAfee Data Protection for Retail (English)

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

McAfee Data Protection for the Biotech and Pharmaceutical Industry (English)

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

Comunidad

Blogs

  • RSA Conference 2015: Shaking Up Security
    McAfee Enterprise - abril 14, 2015

    With RSA Conference drawing near, the information security industry is abuzz. In today’s digital, always-on (rather, always-online) world, it is more critical than ever to keep data protection top of mind. RSA Conference provides an open forum for security professionals to do just that, from learning the latest industry trends to exchanging ideas on how […]

    The post RSA Conference 2015: Shaking Up Security appeared first on McAfee.

  • Do you have a mobile wallet?
    Cybermum Australia - abril 13, 2015

    We recently had a credit card fraud situation in our house. Not only was it very concerning but very time consuming. It literally took hours: cancelling payments and then re-establishing them again with the gym, the schools and array of transport cards. And the worst thing – having to wait until the new cards arrived […]

    The post Do you have a mobile wallet? appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - marzo 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Millions of customers’ data up for sale as RadioShack goes out of business
    Gary Davis - marzo 26, 2015

    When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]

    The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.

  • Shifting the Focus: Cybersecurity as an Enabler
    Tom Gann - marzo 25, 2015

    For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches.  While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]

    The post Shifting the Focus: Cybersecurity as an Enabler appeared first on McAfee.