McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention

DLP for a dynamic world

Overview

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance appliances (physical or virtual) and McAfee ePolicy Orchestrator (ePO) platform, for streamlined deployment, management, updates, and reports.

Time-to-value deployment — Unique, non-invasive Capture technology enables organizations to build and deploy DLP policies faster and more accurately without guesswork or trial and error.

Simplified policy management — Flexible file tagging helps organizations set up time-saving policies based on location and application types. Data Classification technology categorizes large amounts of data so only relevant files are examined and remediated.

Proactive data protection — The only DLP solution that keeps a record of all data leaving the network egress points — giving you visibility into how your sensitive information is being used. It enables you to identify and fix existing broken business processes therefore reducing risk of breach in the future.

Intel Security in leaders quadrant for mobile data protection

Read Report

Gartner: McAfee in the leaders quadrant for content-aware DLP

Read Report

Data protection simplified: A best practices guide to DLP

Read Report

Demos / Tutorials

Demos

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Tutorials

Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.

Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.

Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.

In this video you will learn about performing traffic analysis in McAfee DLP. You will learn about the various device utilities, and how to interpret network statistic and set up capture filters. After viewing the tutorial, you will know how to baseline and tune a McAfee DLP Monitor appliance.

In this tutorial, you will learn about the challenges faced by data growth and an approach to effective data classification. After viewing this video, you will know how to perform data classification with McAfee Data Loss Prevention.

In this tutorial, you will learn about incidents and incident management in McAfee DLP. After this tutorial, you will be familiar with the McAfee DLP incident dashboard and will know how to configure it toenable easy ongoing incident management.

In this tutorial, you will learn how to use basic and advanced search capabilities in captured data, a unique feature of McAfee DLP. You will learn how to leverage captured data to help optimize your DLP policies and protections.

After viewing this video, you will know what action rules are and how to create them in McAfee Data Loss Prevention

After viewing this video, you will know what templates are and how to create them in McAfee Data Loss Prevention.

In this tutorial, you will learn specifics about the DocReg concept in McAfee DLP. After this tutorial, you will know what the DocReg concept is used for and how to effectively use it for fingerprinting data.

In this tutorial, you will learn how to use location based tagging in McAfee DLP in order to prevent critical and sensitive data from being leaked out of your organization.

After viewing this video, you will know how to perform LDAP integration and how to use Role-Based Access Control (RBAC) are and how to create them in McAfee Data Loss Prevention.

In this tutorial you will learn about Concepts in McAfee DLP. After viewing the tutorial, you will know what concepts are, how to create them and how to test their effectiveness.

In this tutorial you will learn about policies in McAfee DLP. After viewing the tutorial, you will know to to create policies and how to test them.

Customer Stories

Arab National Bank

Arab National Bank uses McAfee ePolicy Orchestrator (ePO) software to manage endpoint protection across 5,500 endpoints.

Highlights
  • Reduces manpower required to manage endpoint security from six people to two
  • Accelerates deployment of data loss protection—70 percent faster than competitive solutions faster than competitive solutions
  • Cuts administrative reporting from several days to minutes
  • Saves $152,000 in reduced manual intervention, thanks to integration with third-party security solutions

Banco de Crédito e Inversiones

Banco de Crédito e Inversiones (BCI) selects McAfee Host Data Loss Prevention to protect sensitive customer and corporate assets and meet PCI DSS compliance.

Highlights
  • Detected possible fraud and blocked theft of confidential customer information
  • Prevented users from transferring sensitive data outside the organization
  • Helped achieve compliance with PCI DSS regulations
  • Avoided data breach costs, which offset investment of DLP solution
  • Helped protect BCI’s brand, reputation, and customer loyalty

Bank of China International (BOCI)

Bank of China International slashes risk of data loss with McAfee data protection.

Highlights
  • Delivered easy-to-manage security through an integrated central console
  • Prevented accidental or malicious data loss
  • Provided full visibility and control over use and movement of confidential data
  • Enabled proactive regulatory compliance and risk avoidance

Memorial Hermann Healthcare System

Memorial Hermann Healthcare System guards patient data with McAfee Endpoint Encryption and Device Control.

Highlights
  • Streamlined deployment of endpoint encryption and device control solutions
  • Automatically enforced detailed device and data policies
  • Simplified configuration; McAfee Professional Services team provided expert support during migration
  • Protected Memorial Hermann’s company image, reputation, and brand

Mindray

Mindray compared solutions from different security vendors, and McAfee’s data protection portfolio of products stood out against the competition due to exceptional overall performance.

Highlights
  • Enhances compliance and ensures effective implementation of the company’s security policies
  • helps mitigate data asset risks and reduces the overall operational expenses associated with managing and maintaining the solution, which, in turn contributes significantly to business development

TELUS International Philippines

TELUS uses the Security Connected framework from McAfee as the foundation for its multilayered security infrastructure.

Highlights
  • Improves visibility, control, and overall security posture with central security administration
  • Accelerates remediation of malware attacks daily
  • Provides two-fold defense against data loss
  • Increases customer confidence, willingness to do business

Texas Tech University Health Sciences Center

Texas Tech University Health Sciences Center (TTUHSC) offers programs in medicine, nursing, pharmacy, biomedicine and health sciences.

Highlights
  • Extensible compliance reporting.
  • Block thousands of attacks.
  • Security audits in minutes.
  • Improve visibility and productivity.

The Doe Run Company

The Doe Run Company protects intellectual property with McAfee Total Protection for Data.

Highlights
  • Enabled proactive enforcement of intellectual property security policies
  • Dramatically reduced the risks of mobile computing
  • Delivered robust safeguards at the host and the gateway
  • Automatically blocked data loss
  • Centralized security policy management

Tyco Electronics

Tyco Electronics selected McAfee security solutions to enhance internal network security and simplify compliance.

Highlights
  • Locked down internal security
  • Secured notebooks and desktops from viruses, worms, spyware, and other threats
  • Enabled rapid containment of any outbreak
  • Safeguarded data on mobile devices
  • Simplified patches and policy changes

Xinjiang Mobile

Xinjiang Mobile's comprehensive assessment of data protection products in the market lead them to choose and deploy McAfee’s solution.

Highlights
  • Keeps data in Xinjiang Mobile’s core network safe and free from risks of financial loss, brand damage, lost customers, competitive disadvantage and other risk factors
  • Tightens management and control of removable media and ensures security of corporate data

Modules

McAfee DLP Manager
McAfee DLP Manager

McAfee DLP Manager saves you time and money by providing flexible, centralized, and delegated control over McAfee DLP. It easily integrates with the McAfee ePolicy Orchestrator (ePO) platform to provide enterprise-wide management and monitoring.

McAfee DLP Discover
McAfee DLP Discover

McAfee DLP Discover finds sensitive information, even if the location is unknown. Using advanced network crawling technology, DLP Discover searches systems based on LAN segment, IP address range, network group, and many other easily defined criteria. Search information held in databases can be searched without the help of a database administrator. Schedule scans to run at intervals that fit your workflow and automatically fingerprint the results to support the most accurate data protection.

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor enables you to find, track, and protect sensitive information from any application or location, in any format, over any protocol or port, over time. Unrivaled data analytics support easy, accurate policy creation and rapid, flexible response.

McAfee DLP Prevent
McAfee DLP Prevent

McAfee DLP Prevent helps you enforce safe data-handling policies for information leaving the boundaries of your network. It integrates with most commercial Internet gateway security technologies for email, web, IM, and other network applications.

McAfee DLP Endpoint
McAfee DLP Endpoint

McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and via removable storage devices.

McAfee Device Control
McAfee Device Control

McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media so your data stays protected under company control.

Resources

Data Sheets

Identify Data Risk In Your Organization

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee Device Control

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee DLP Monitor

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee DLP Discover

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee DLP Manager

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee DLP Prevent

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee DLP Endpoint

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Solution Services — Enhanced Services DLP

For a technical summary on the McAfee product listed above, please view the product data sheet.

Infographics

Reports

Magic Quadrant for Content-Aware Data Loss Prevention

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Content-Aware Data Loss Prevention for four consecutive years.

Business-Centric DLP

This report, by Jon Oltsik from Enterprise Strategy Group, examines the need for a new business-centric approach to DLP in order to align business and security requirements.

Best Practices in Data Protection (Executive Summary)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Best Practices in Data Protection (Full Report)

This research, conducted by the Ponemon Institute, focuses on issues relating to the use of data protection solutions such as endpoint encryption and data loss prevention within the workplace. It provides guidance on how best practice status can be achieved.

Finding the Right Data Loss Prevention Solution for Managing E-Discovery

This report, by Gary Clayton from Privacy Compliance Group, examines the role that Data Loss Prevention (DLP) technology can play in helping organizations address the challenges of locating information in response to electronic discovery.

The Case For a New Data-Centric DLP

This report, by Jon Oltsik from Enterprise Strategy Group, focuses on how data-centric DLP provides an opportunity to lower risk and enable business agility. This is the ultimate value of any security technology.

Low Hanging Fruit: Quick Wins with Data Loss Prevention

This report, by Rich Mogull from Securosis, details how to get immediate benefits from a DLP solution.

Solution Briefs

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Identify Sensitive Data and Prevent Data Leaks

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

McAfee Data Loss Prevention for Healthcare

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

McAfee Data Protection for Energy

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

McAfee Data Protection for Retail

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

McAfee Data Protection for the Biotech and Pharmaceutical Industry

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

White Papers

Data Loss Prevention Best Practices for Healthcare

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Conquer the Top 20 Critical Security Controls

The strength of the Critical Security Controls (CSCs) is their ability to reflect the consensus of successful experiences captured and refined over multiple revisions. The CSCs help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Implementing and Managing a Data Loss Prevention Solution

Data loss prevention (DLP) is one of the best and most far-reaching security tools in your arsenal. A successful DLP implementation can be yours with proper planning and testing. Rich Mogull, analyst and CEO of independent research firm Securosis, leads you through four key steps in this white paper.

Architecting the Security of the Next-Generation Data Center

This document is aimed at those looking at data center builds, upgrades, or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation data centers.

Data Loss by the Numbers

This paper breaks down attack sources into four categories: external, malicious insiders, accidental insiders, and unknown. Breach categories are limited to areas that are most directly associated with data centers.

Community

Blogs