McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.
Enhanced virtualization support — Enforces per-user policy for multiple sessions and VDIs, which allows flexibility and better control of the data flowing to the shared terminals.
Time-saving file tagging — Helps organizations set up time-saving policies based on location and application types. Security policies are preserved against file manipulation and transformation.
Ironclad IP protection — Protects product designs and source codes against intentional and unintentional data loss by enforcing clipboard protection for both "Copy From" and "Paste To" actions, in addition to the new screen capture (e.g., SnagIt) protection tools.
Streamlined data encryption — Integrates with McAfee Endpoint Encryption to automate content-aware data encryption policies.
Centralized Management Console — Leverages McAfee ePolicy Orchestrator (ePO) management console to define policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements.
Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers.
Ensure that your confidential information is protected throughout your network — on servers, in databases, and across endpoints.
Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements.
Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels — even when data is disguised.
Streamline management of your entire security risk management portfolio, including McAfee DLP Endpoint, via the centralized McAfee ePolicy Orchestrator (ePO) 4.5 console.
Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Bank of China International slashes risk of data loss with McAfee data protection.
CEMEX is a global building materials company that produces, distributes, and sells cement, concrete, aggregates, and related building materials and services to customers and communities throughout the Americas, Europe, Africa, Asia, and the Middle East. Based in Monterrey, Mexico, CEMEX employs more than 43,000, with operations in 50 countries spanning four continents. The company is also the world’s leading supplier of ready-mix concrete.
McAfee helps Gateway Bank reduce the security administration burden while simplifying compliance and improving security for client machines and email.
The Doe Run Company protects intellectual property with McAfee Total Protection for Data.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Malware authors have a tendency to conceal themselves so that they can continue their actions uninterrupted. However, we have observed the opposite trend when some authors, who like to show their swagger when writing malware—in particular remote access tools (RATs). They proudly spread their work and post videos on YouTube to demonstrate them. In this […]
The post Middle-East Developer of SpyGate Struts His Stuff Online appeared first on McAfee.
At the AVAR conference in November, with the help of coauthor and independent security researcher Song Li, we will present our findings of an emerging mobile threat vector. We have found that in a group of popular retail apps, such as Costco’s and Walgreens’ apps for Android, when a QR code is scanned using the […]
The post ZebrAttack Creates Data Breach via Mobile OS, App Vulnerabilities appeared first on McAfee.
A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should address in a couple of blogs; (1) what should people look for when selecting an encryption solution, and (2) how do those encryption […]
The post More Choices for Encryption to Protect Your Data-At-Rest appeared first on McAfee.
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and demands payment to free the […]
Retailers all over the world lose sleep over data breaches—and CSOs and IT security managers work hard to make sure that cyber thieves stay out of their endpoints and networks. They are layering on more anti-malware solutions, tighter defenses at email and web gateways, stronger next-generation firewalls, and more efficient intrusion prevention systems. But with […]
The post No Exit: How to Keep Data from Escaping via POS Systems appeared first on McAfee.