McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention

DLP para un mundo dinámico

Próximos pasos:

Descripción general

McAfee Total Protection for Data Loss Prevention (DLP) salvaguarda la propiedad intelectual y garantiza el cumplimiento de las normativas al proteger los datos confidenciales donde quiera que residan: in situ, en la nube o en los puntos terminales. McAfee DLP se entrega a través de dispositivos de bajo mantenimiento (físicos o virtuales) y de la plataforma McAfee ePolicy Orchestrator (ePO) para optimizar la implementación, la administración, las actualizaciones y la generación de reportes.

Implementación rápida: la tecnología Capture exclusiva y no invasiva permite que las organizaciones elaboren e implementen las políticas de protección contra pérdidas de datos con mayor rapidez y precisión, sin tener que hacer suposiciones ni pruebas y errores.

Gestión de políticas simplificada : el etiquetado flexible de archivos ayuda a las organizaciones a establecer políticas que ahorran tiempo en función de la ubicación y de los tipos de aplicación. La tecnología de clasificación de datos categoriza grandes cantidades de datos de forma que solo se examinan y corrigen los archivos pertinentes.

Protección de datos proactiva: es la única solución DLP que registra todos los datos que salen de las redes y da visibilidad del uso que se hace de la información confidencial. Permite identificar y corregir procesos empresariales que se han violado y, por tanto, se reduce el riesgo de que se produzcan fugas de información en el futuro.

Demostraciones y tutoriales

Demostraciones

Learn how to build modular policies and reusable rulesets in the latest DLP Endpoint 9.4 to help quickly and easily manage data protection policies.

Learn how McAfee Data Loss Prevention solution aligns data discovery, classification, policy management, and security controls with business requirements and processes.

Tutoriales

Follow this tutorial to see how to add McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent appliances via the McAfee DLP Manager console.

Initial configuration steps are important to set up a DLP appliance. Check out this easy to follow tutorial to see how you can set up the different McAfee DLP appliances.

Classification is an important precursor to establishing effective policies to protect data from leaving the organization. You will learn the importance of classification and how to do a classification scan with McAfee Discover appliance.

Inventory scan is the first step in the workflow for discovery and classification of sensitive content. In this quick tip video, you will learn what is an inventory scan and how to do an inventory scan with McAfee DLP Discover appliance.

Role-Based Access Control is also known as Separation of Duties. It provides granular control over users who view DLP Incident Manager and Operational Events data.

Experiencias de los clientes

Sutherland Global Services (English)

The McAfee Security Connected framework drives compliance and protects 24,000 endpoints for this consulting company.

Aspectos destacados
  • Virus attacks are virtually nonexistent throughout the globally distributed enterprise.
  • Central McAfee ePO console enables global management of entire IT infrastructure by only a two-person IT staff.
  • Industry-leading reporting tools facilitate compliance.
  • Automatic updates improve operational efficiency and ease burden on IT staff.
  • McAfee updates and notifications enable proactive response to threats.

Módulos

McAfee DLP Discover
McAfee DLP Discover

McAfee DLP Discover localiza la información confidencial, aunque se desconozca el lugar en el que se encuentra. Con tecnología avanzada de exploración de la red, McAfee Network DLP Discover busca sistemas basándose en el segmento de la red local, el intervalo de direcciones IP, el grupo de redes y muchos otros criterios fáciles de definir. Busque información contenida en bases de datos sin la ayuda de un administrador de bases de datos. Programe escaneos para que se ejecuten a intervalos coincidentes con su flujo de trabajo y codifique automáticamente los resultados para obtener la protección de datos más precisa.

McAfee DLP Monitor
McAfee DLP Monitor

McAfee DLP Monitor permite buscar, hacer seguimiento y proteger a lo largo del tiempo la información confidencial de cualquier aplicación o ubicación, en cualquier formato, protocolo o puerto. Unas funciones analíticas sin rival facilitan la elaboración precisa de directivas y la respuesta rápida y flexible.

McAfee DLP Prevent
McAfee DLP Prevent

McAfee DLP Prevent ayuda a que las políticas de seguridad sobre el manejo de datos se apliquen a la información que sale de los límites de la red. Se integra con la mayoría de las tecnologías de seguridad del gateway de Internet que se comercializan para el correo electrónico, la Web, la mensajería instantánea y otras aplicaciones de red.

McAfee DLP punto terminal
McAfee DLP punto terminal

McAfee DLP Endpoint ofrece una protección incomparable frente al robo y divulgación accidental de los datos confidenciales. La protección opera en las redes, las aplicaciones y los dispositivos de almacenamiento extraíbles.

McAfee Device Control
McAfee Device Control

McAfee Device Control le ayuda a supervisar y restringir los datos copiados en dispositivos de almacenamiento y medios portátiles con el fin de mantener los datos protegidos bajo el control de la empresa.

Noticias y acontecimientos

Recursos

Fichas técnicas

Identify Data Risk In Your Organization (English)

Identify the risks to your vital information that exist within your organization so that you can take appropriate measures to prevent exposure and potentially damaging consequences.

McAfee DLP Endpoint

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Discover

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Monitor

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

McAfee DLP Prevent

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Servicios para las soluciones McAfee — Enhanced Services para McAfee® Data Loss Prevention

Si desea ver un resumen técnico del producto McAfee indicado, consulte la ficha técnica del mismo.

Infographics

SANS Top 20 Critical Controls Poster (English)

The top 20 critical controls for effective cyberdefense.

Libros blancos

Data Loss Prevention Best Practices for Healthcare (English)

Due to the ever-changing web of regulations that span federal, state, and local jurisdictions, healthcare organizations are being required more than ever to safeguard patient data, including electronic protected health information (ePHI). This paper explains how deploying a Data Loss Prevention system in a healthcare organization is one part of a broader data protection program.

Conquer the Top 20 Critical Security Controls (English)

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Reportes

Best Practices for Data Loss Prevention: A Process, Not a Technology (English)

Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. This latest Gartner report identifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.

Implementing and Managing a Data Loss Prevention Solution (English)

Implementing and managing DLP isn’t nearly as difficult as many security professionals expect. Over the 10 plus years Securosis has covered the technology — talking with hundreds of DLP users — countless tips, tricks, and techniques have been collected for streamlined and effective deployments and have been compiled into straightforward processes in this report to ease most common pain points.

SANS Report: Critical Security Controls: From Adoption to Implementation (English)

A recent SANS survey provides an in-depth look at the primary industries adopting critical security controls and how they approach implementation.

Resúmenes de soluciones

Keep Your Data Safe for Office 365 (English)

McAfee DLP offers expansive, yet flexible, polices and templates that can help address risky employee behavior by protecting sensitive data from day-today user actions.

McAfee Total Protection for Data Loss Prevention (English)

McAfee Total Protection for DLP safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on the network, in storage systems, or at the endpoint, while saving time and money with centralized deployment, management, and reporting.

Identify Sensitive Data and Prevent Data Leaks (English)

The interoperability between TITUS Document Classification software and McAfee Data Loss Prevention (DLP) further reduces your risk of data loss by capturing end users’ inherent knowledge about the sensitivity of documents and making that information available to McAfee host and network-based DLP as visual classification labels and corresponding metadata.

McAfee Data Loss Prevention for Healthcare (English)

Learn how McAfee data protection solutions simplify data security and compliance, deliver flexible control, and help build the trust of your partners.

McAfee Data Protection for Energy (English)

Whether your business is energy exploration, generation, or distribution, learn how to upgrade your data controls to advanced, flexible solutions from McAfee.

McAfee Data Protection for Retail (English)

Whether you start with full disk encryption or choose Data Loss Prevention (DLP), learn how McAfee can help make sure sensitive data stays where it belongs.

McAfee Data Protection for the Biotech and Pharmaceutical Industry (English)

Learn how both global pharmaceutical titans and boutique biotech teams turn to McAfee for protection of highly valued, highly regulated data.

Comunidad

Blogs

  • For Sale: Your Data, Hardly Used
    Gary Davis - julio 2, 2015

    It should come as no surprise that your data is the most valuable commodity you have on the information superhighway. Your data is so valuable, in fact, that cybercriminals go to great lengths to steal it. But that doesn’t mean your data is always hard to get. Sometimes, when a company falls on hard times, […]

    The post For Sale: Your Data, Hardly Used appeared first on McAfee.

  • Beyond the Single Product Sale
    Fernando Quintero - junio 17, 2015

    Watch any movie that involves computer security or hacking and someone will talk about the strength of the firewall or the protection of encryption. At one point in the history of the Internet, firewalls were thought of as not just essential, but the cure-all of threat woes. Likewise, encryption was seen as the silver bullet […]

    The post Beyond the Single Product Sale appeared first on McAfee.

  • The Past, Present, and Future of Phishing and Malware
    David Bull - junio 9, 2015

    In the Digital Age, email is second nature. It’s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger – especially if you’re not even alerted to the bait! This email ‘bait’ I’m referring to comes in the form of phishing scams, which are becoming increasingly abundant as […]

    The post The Past, Present, and Future of Phishing and Malware appeared first on McAfee.

  • When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
    Ankit Anubhav - mayo 29, 2015

    Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. This two way connection not only […]

    The post When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign appeared first on McAfee.

  • What is the Cloud?
    Robert Siciliano - mayo 25, 2015

    You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

    The post What is the Cloud? appeared first on McAfee.