McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention

Prévention des fuites de données pour un monde dynamique

Etapes suivantes :

Présentation

McAfee Total Protection for Data Loss Prevention (DLP) préserve la propriété intellectuelle et garantit la conformité. La solution protège les données sensibles, où qu'elles soient hébergées : sur site, dans le cloud ou sur les postes clients. La fonction de protection contre les fuites de données est assurée par des appliances à faible maintenance (physiques ou virtuelles) et par la plate-forme McAfee ePolicy Orchestrator (ePO), conçue pour simplifier le déploiement, la gestion, les mises à niveau et la génération de rapports.

Déploiement ultrarapide — La technologie Capture unique non invasive permet aux entreprises de créer et déployer les stratégies McAfee DLP de façon plus rapide et précise, sans passer par une étape de déductions ou d'approximations successives.

Gestion des stratégies simplifiée — Le marquage flexible des fichiers permet aux entreprises de configurer des stratégies optimisées en fonction de l'emplacement et du type d'application. La technologie de classification des données catégorise un grand nombre de données de sorte que seuls les fichiers pertinents soient examinés et corrigés.

Protection proactive des données — McAfee Total Protection for Data Loss Prevention est la seule solution de protection contre les fuites de données qui conserve une trace de toutes les données qui franchissent les points de sortie du réseau, vous offrant ainsi une visibilité sur l'utilisation de vos informations sensibles. Vous pouvez ainsi identifier et corriger les éventuelles failles au niveau des processus d'entreprise, et réduire le risque de violations futures.

Démonstrations et didacticiels

Démonstrations

Learn how to build modular policies and reusable rulesets in the latest DLP Endpoint 9.4 to help quickly and easily manage data protection policies.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Didacticiels

Follow this tutorial to see how to add McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent appliances via the McAfee DLP Manager console.

Initial configuration steps are important to set up a DLP appliance. Check out this easy to follow tutorial to see how you can set up the different McAfee DLP appliances.

Learn how to configure Active Directory rules and policies; and how to integrate Active Directory with McAfee DLP Manager.

Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.

Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.

Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.

Témoignages de clients

Sutherland Global Services (English)

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

Points forts
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

Modules

McAfee DLP Manager
McAfee DLP Manager

McAfee DLP Manager vous permet d'économiser du temps et de l'argent en vous offrant un contrôle flexible, centralisé et délégué sur McAfee DLP. Il s'intègre aisément avec la plate-forme McAfee ePolicy Orchestrator (ePO) pour assurer la gestion et la surveillance des données à l'échelle de l'entreprise.

McAfee DLP Discover
McAfee DLP Discover

McAfee DLP Discover trouve les informations sensibles, même si leur emplacement est inconnu. Grâce à une technologie performante de balayage du réseau, DLP Discover analyse les systèmes par segment de réseau local (LAN), plage d'adresses IP, groupe réseau et selon de nombreux autres critères simples à définir. Les informations de recherche stockées dans les bases de données sont accessibles sans l'aide d'un administrateur de bases de données. Planifiez les analyses pour qu'elles s'exécutent en fonction de votre workflow et analysez automatiquement les résultats afin d'assurer la protection des données la plus précise.

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor vous permet de trouver, de suivre et de protéger les informations sensibles à partir de n'importe quelle application ou n'importe quel emplacement, sous tout format, via tout protocole ou port, à tout moment. Des analyses de données rigoureuses permettent de créer facilement des stratégies précises et assurent une réponse souple et rapide.

McAfee DLP Prevent
McAfee DLP Prevent

McAfee DLP Prevent vous aide à mettre en œuvre des stratégies de manipulation sécurisée des données pour les informations quittant le périmètre du réseau. Il s'intègre avec la plupart des produits de sécurisation des passerelles Internet disponibles sur le marché pour des applications web, de messagerie électronique, de messagerie instantanée et d'autres applications réseau.

McAfee DLP Endpoint
McAfee DLP Endpoint

McAfee DLP Endpoint offre une protection inégalée contre le vol et la divulgation accidentelle de données confidentielles. Cette protection s'étend aux applications, aux périphériques de stockage amovibles et aux réseaux.

McAfee Device Control
McAfee Device Control

McAfee Device Control vous permet de surveiller et de restreindre la copie de données sur des périphériques et supports de stockage amovibles, pour que celles-ci restent protégées et sous le contrôle de votre entreprise.

Actualités et événements

Ressources

Fiches techniques

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee DLP Endpoint

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee DLP Manager

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee DLP Discover

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee DLP Monitor

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee DLP Prevent

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee Device Control

Pour un compte rendu technique sur le produit McAfee présenté ci-dessus, veuillez consulter la fiche technique correspondante.

McAfee Solution Services — Enhanced Services DLP (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Infographics

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Livres blancs

Data Loss Prevention Best Practices for Healthcare (English)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Présentations de solution

McAfee Total Protection for Data Loss Prevention (English)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

McAfee Data Loss Prevention for Healthcare (English)

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

McAfee Data Protection for Energy (English)

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

McAfee Data Protection for Retail (English)

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

McAfee Data Protection for the Biotech and Pharmaceutical Industry (English)

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

Rapports

Best Practices for Data Loss Prevention: A Process, Not a Technology (English)

Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. This latest Gartner report identifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.

Implementing and Managing a Data Loss Prevention Solution (English)

Implementing and managing DLP isn’t nearly as difficult as many security professionals expect. Over the 10 plus years Securosis has covered the technology — talking with hundreds of DLP users — countless tips, tricks, and techniques have been collected for streamlined and effective deployments and have been compiled into straightforward processes in this report to ease most common pain points.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

Communauté

Blogs

  • What is the Cloud?
    Robert Siciliano - mai 25, 2015

    You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

    The post What is the Cloud? appeared first on McAfee.

  • Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool
    Umesh Wanve - mai 19, 2015

    Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]

    The post Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - mai 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - mai 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Teach Your Mom to be a Sure & Safe Netizen
    Anindita Mishra - mai 10, 2015

    Mother’s Day Role Reversal for Young Techies Remember those times when you frowned and squinted, tongue held between your teeth, as your mom guided your little hand over the cursive letters? Remember how she patiently spent hours teaching you the alphabets and numbers? This Mother’s Day, acknowledge her extraordinary contribution in creating a literate you […]

    The post Teach Your Mom to be a Sure & Safe Netizen appeared first on McAfee.