McAfee DLP Manager provides a flexible, efficient, and cost-effective data control solution, delivering streamlined incident monitoring, dynamic searching, and easy policy building. DLP Manager allows you to configure, control, and monitor all McAfee DLP components from a single interface.
Gain incident visibility — DLP Manager allows you to view all incidents generated by McAfee DLP anywhere in your network.
Quickly create reports — With DLP Manager, you can quickly generate reports that cover one, multiple, or all McAfee DLP components, and combine incidents and cases as needed to fit your workflow.
Perform sensitive data searches — DLP Manager allows you to perform searches against all McAfee DLP components to find sensitive data, learn how it is used, fine-tune rules, and validate policies on the fly.
Get started quickly — You can deploy preconfigured policies for common regulations such as HIPAA and PCI.
Expedite setup with built-in roles — DLP Manager’s built-in roles expedite setup for key team members. You can add custom administration roles, allowing any user to configure, manage, monitor, and respond to any data or incident within their control.
Configure, manage, and monitor all DLP components with the familiar McAfee ePolicy Orchestrator (ePO) platform, and create comprehensive dashboards and reports from one central console.
Determine who views specific incidents, from general risk reporting to detailed incident information. Protect sensitive information with data changes right in the management user interface.
Configure, manage, check status, and view all alerts from a single console. Quickly hand off cases and incidents between authorized administrators.
Consolidate and address group-related incidents that require remediation. Easily track multiple incidents and cases, and escalate incidents to different users. Access a detailed case history, export cases for offline viewing, and send email notifications to case owners if a change is made.
Access a centralized view of all incidents that were generated by any McAfee DLP component. Generate reports that cover one, multiple, or all McAfee DLP components. Automate reporting with prepackaged, configurable reports that you can schedule for automatic email delivery in multiple formats.
Search, mine, and analyze data. Find sensitive data, learn how it is used, fine-tune rules quickly, and validate rules on the fly.
Quickly filter information to get to specific data of interest. Automatically create filters by selecting data values, and easily add, remove, and compound filters.
Configure and manage any McAfee DLP component from a single interface, the McAfee ePO platform, and easily check the status of CPU utilization, disk utilization, and network throughput. View remediation alarms and alerts generated by any managed McAfee DLP component.
Distribute polices and rules for all, or specific, data loss vectors. Configure and distribute action rules, including email notification, encryption, quarantining, redirection, bouncing, and blocking.
Correlate incidents into a customizable dashboard. Escalate incidents through a flexible embedded case management tool and delegate responsibility for a specific incident and/or case among key users. Rules affected by workflow changes are easily updated.
Expedite setup using preconfigured roles for key members of teams within the organization, including administrators, legal, human resources, compliance, operations, and information security. Assign permissions to a role with high granularity and define additional roles with a few mouse clicks. Integrate with LDAP or Microsoft Active Directory for centralized authentication services.
McAfee DLP Manager, McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent are now supported on the McAfee DLP 5500 appliance. The DLP 5500 appliance is an Intel-based platform with dual six core CPUs, 32 GB of RAM and over 10 TB of storage in a 2U form factor. DLP hardware appliance solutions are self-contained devices. There are no minimum software or hardware system requirements or additional database installations required.
The Network DLP 4400, Network DLP 1650, and Network DLP 3650 appliances have been discontinued. In accordance with McAfee’s End of Life policy, they are being supported until October 2016.
For a technical summary on the McAfee product listed above, please view the product data sheet.
With data breaches occurring nearly every week and billions of dollars being lost to cybercrime annually, it is more critical than ever to secure your private networks and intranets. As traditional firewalls make way for next-generation firewalls (NGFWs), it’s clear that the network security tides have changed. With that in mind, we have compiled many […]
The post NGFW Content Hub: A One-Stop Shop for Your Network Security Needs appeared first on McAfee.
Malware authors have a tendency to conceal themselves so that they can continue their actions uninterrupted. However, we have observed the opposite trend when some authors, who like to show their swagger when writing malware—in particular remote access tools (RATs). They proudly spread their work and post videos on YouTube to demonstrate them. In this […]
The post Middle-East Developer of SpyGate Struts His Stuff Online appeared first on McAfee.
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector. We have found that in a group of popular retail apps, such as Costco’s and Walgreens’ apps for Android, when a QR code is scanned using the […]
The post ZebrAttack Creates Data Breach via Mobile OS, App Vulnerabilities appeared first on McAfee.
A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should address in a couple of blogs; (1) what should people look for when selecting an encryption solution, and (2) how do those encryption […]
The post More Choices for Encryption to Protect Your Data-At-Rest appeared first on McAfee.
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and demands payment to free the […]