McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention

역동적인 세계를 위한 DLP

다음 단계:
  • McAfee와 상담
    McAfee를 구매할 준비가 되셨거나 구매 전에 알고싶은 내용이 있으십니까? McAfee 전문가와 상담해 보십시오. 월요일부터 금요일까지 상담 서비스를 이용하실 수 있습니다. 영어로만 제공됨.
  • 리셀러 찾기
  • 연락처
  • 전화: 82 2 3458 9800

개요

McAfee Total Protection for Data Loss Prevention(DLP)은 구내, 클라우드 또는 엔드포인트 등 위치에 관계없이 중요한 데이터를 보호함으로써 지적 재산을 보호하고 컴플라이언스를 보장합니다. McAfee DLP는 유지 관리가 적게 필요한 어플라이언스(실제 또는 가상)와 McAfee ePolicy Orchestrator(ePO) 플랫폼을 통해 제공되어 배포, 관리, 업데이트, 보고를 최적화해 줍니다.

가치 실현 시간 배포 — 고유한 비침입성 캡처 기술을 사용하면 조직은 추측이나 시행착오 없이 DLP 정책을 더욱 신속하고 정확하게 구축하고 배포할 수 있습니다.

간소화된 정책 관리 — 유연한 파일 태그 지정을 사용하면 조직은 위치 및 응용프로그램 유형에 따라 시간 절약 정책을 설정할 수 있습니다. 데이터 분류 기술은 대용량 데이터를 분류하므로 관련 파일만 검사하고 교정합니다.

사전 예방적 데이터 보호 — 네트워크 이그레스 포인트에서 유출되는 모든 데이터의 레코드를 유지하는 유일한 DLP 솔루션으로, 이를 통해 중요한 정보가 사용되는 방법을 확인할 수 있습니다. 이 솔루션을 사용하면 기존의 중단된 비즈니스 프로세스를 식별하고 수정할 수 있으므로 향후 위반에 대한 위험을 줄일 수 있습니다.

데모/자습서

데모

Learn how to build modular policies and reusable rulesets in the latest DLP Endpoint 9.4 to help quickly and easily manage data protection policies.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

자습서

Follow this tutorial to see how to add McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent appliances via the McAfee DLP Manager console.

Initial configuration steps are important to set up a DLP appliance. Check out this easy to follow tutorial to see how you can set up the different McAfee DLP appliances.

Learn how to configure Active Directory rules and policies; and how to integrate Active Directory with McAfee DLP Manager.

Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.

Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.

Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.

고객 사례

Sutherland Global Services (English)

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

주요 사항
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

모듈

McAfee DLP Manager
McAfee DLP Manager

McAfee DLP Manager는 McAfee DLP에 비해 유연한 중앙 관리 방식의 위임 제어 기능을 제공하여 시간과 비용이 절감됩니다. McAfee ePolicy Orchestrator(ePO) 플랫폼과 간편하게 통합되어 전사적 관리 및 모니터링 기능을 제공합니다.

McAfee DLP Discover
McAfee DLP Discover

McAfee DLP Discover는 위치를 알지 못하는 경우라도 민감한 데이터를 찾아냅니다. 첨단 네트워크 접근 기술을 이용해 DLP Discover는 LAN 세그먼트, IP 주소 범위, 네트워크 그룹 및 기타 여러 가지 쉽게 정의할 수 있는 기준을 기반으로 시스템을 검색합니다. 따라서 데이터베이스 관리자가 없어도 데이터베이스에 저장된 검색 정보를 검색할 수 있습니다. 기업의 업무 흐름에 맞춰 조정한 주기로 검색 실행 일정을 정하고 결과를 자동으로 포착하여 가장 정확한 데이터 보호 성능을 지원합니다.

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor를 사용하면 저장되어 있는 응용프로그램이나 위치, 사용되는 포맷, 경로인 프로토콜이나 포트 유형과는 상관없이 반복적으로 민감한 정보를 찾고 추적하여 보호할 수 있습니다. 최고의 데이터 분석을 통해 쉽고 정확한 정책 생성 및 신속하고 유연한 응답이 가능해집니다.

McAfee DLP Prevent
McAfee DLP Prevent

McAfee DLP Prevent를 사용하면 기업의 네트워크에서 전송되는 정보에 대한 안전한 데이터 취급 정책을 실행할 수 있습니다. 이 제품에는 이메일, 웹, IM 및 기타 네트워크 응용 프로그램에 상용성이 가장 뛰어난 인터넷 게이트웨이 보안 기술이 통합되어 있습니다.

McAfee DLP Endpoint
McAfee DLP Endpoint

McAfee DLP Endpoint는 예기치 않게 기밀 데이터가 누출되거나 도난당하는 일이 발생하지 않도록 최고의 보호 성능을 제공합니다. 이러한 보호는 응용프로그램과 이동식 저장 장치를 통해 네트워크 전반에서 이루어집니다.

McAfee Device Control
McAfee Device Control

McAfee Device Control을 사용하면 이동식 저장장치와 매체에 복사되는 데이터를 모니터링하고 제한할 수 있어서 해당 데이터를 기업이 지속적으로 관리할 수 있습니다.

리소스

Infographics

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

데이터시트

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee DLP Endpoint

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee DLP Discover

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee DLP Manager

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee DLP Monitor

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee DLP Prevent

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Device Control

위에 나열된 McAfee 제품의 기술 요약은 제품 데이터 시트를 참조하십시오.

McAfee Solution Services — Enhanced Services DLP (English)

For a technical summary on the McAfee product listed above, please view the product data sheet.

백서

Data Loss Prevention Best Practices for Healthcare (English)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

보고서

Best Practices for Data Loss Prevention: A Process, Not a Technology (English)

Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. This latest Gartner report identifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.

Implementing and Managing a Data Loss Prevention Solution (English)

Implementing and managing DLP isn’t nearly as difficult as many security professionals expect. Over the 10 plus years Securosis has covered the technology — talking with hundreds of DLP users — countless tips, tricks, and techniques have been collected for streamlined and effective deployments and have been compiled into straightforward processes in this report to ease most common pain points.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

솔루션 개요

McAfee Total Protection for Data Loss Prevention (English)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

McAfee Data Loss Prevention for Healthcare (English)

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

McAfee Data Protection for Energy (English)

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

McAfee Data Protection for Retail (English)

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

McAfee Data Protection for the Biotech and Pharmaceutical Industry (English)

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

커뮤니티

블로그

  • When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
    Ankit Anubhav - 5월 29, 2015

    Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. This two way connection not only […]

    The post When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign appeared first on McAfee.

  • What is the Cloud?
    Robert Siciliano - 5월 25, 2015

    You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

    The post What is the Cloud? appeared first on McAfee.

  • Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool
    Umesh Wanve - 5월 19, 2015

    Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]

    The post Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - 5월 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - 5월 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.