McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.
Enhanced virtualization support — Enforces per-user policy for multiple sessions and VDIs, which allows flexibility and better control of the data flowing to the shared terminals.
Time-saving file tagging — Helps organizations set up time-saving policies based on location and application types. Security policies are preserved against file manipulation and transformation.
Ironclad IP protection — Protects product designs and source codes against intentional and unintentional data loss by enforcing clipboard protection for both "Copy From" and "Paste To" actions, in addition to the new screen capture (e.g., SnagIt) protection tools.
Streamlined data encryption — Integrates with McAfee Endpoint Encryption to automate content-aware data encryption policies.
Centralized Management Console — Leverages McAfee ePolicy Orchestrator (ePO) management console to define policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements.
Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers.
Ensure that your confidential information is protected throughout your network — on servers, in databases, and across endpoints.
Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements.
Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels — even when data is disguised.
Streamline management of your entire security risk management portfolio, including McAfee DLP Endpoint, via the centralized McAfee ePolicy Orchestrator (ePO) 4.5 console.
Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Kleberg Bank relies on Intel Security for comprehensive protection, time savings, and to support compliance.
Sicredi, one of Brazil’s largest credit union systems, consolidated their comprehensive security environment with Intel Security.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.
Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.
Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.
Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.
No good comes of breaches. Accessing and publicly revealing information meant to be private is rarely appropriate, and sometimes it can be downright ugly. The latest incident to fall into this category? A recent breach of an online cheating site, affecting up to 37 million people. Here’s what you need to know. On Sunday night, […]
The post Adultery Site Ashley Madison Hacked, 37 Million Accounts Compromised appeared first on McAfee.
It should come as no surprise that your data is the most valuable commodity you have on the information superhighway. Your data is so valuable, in fact, that cybercriminals go to great lengths to steal it. But that doesn’t mean your data is always hard to get. Sometimes, when a company falls on hard times, […]
Watch any movie that involves computer security or hacking and someone will talk about the strength of the firewall or the protection of encryption. At one point in the history of the Internet, firewalls were thought of as not just essential, but the cure-all of threat woes. Likewise, encryption was seen as the silver bullet […]
In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This email ‘bait’ I’m referring to comes in the form of phishing scams, which are becoming increasingly abundant as […]
The post The Past, Present, and Future of Phishing and Malware appeared first on McAfee.
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. This two way connection not only […]
The post When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign appeared first on McAfee.