McAfee DLP Endpoint

McAfee DLP Endpoint

Integrated and comprehensive endpoint data protection

Next Steps:

Overview

McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.

Enhanced virtualization support — Enforces per-user policy for multiple sessions and VDIs, which allows flexibility and better control of the data flowing to the shared terminals.

Time-saving file tagging — Helps organizations set up time-saving policies based on location and application types. Security policies are preserved against file manipulation and transformation.

Ironclad IP protection — Protects product designs and source codes against intentional and unintentional data loss by enforcing clipboard protection for both "Copy From" and "Paste To" actions, in addition to the new screen capture (e.g., SnagIt) protection tools.

Streamlined data encryption — Integrates with McAfee Endpoint Encryption to automate content-aware data encryption policies.

Centralized Management Console — Leverages McAfee ePolicy Orchestrator (ePO) management console to define policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements.

Features & Benefits

Protect your enterprise from the risks of data loss

Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers.

Safeguard all layers of your infrastructure

Ensure that your confidential information is protected throughout your network — on servers, in databases, and across endpoints.

Prove compliance with less effort

Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements.

Control data transfer

Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels — even when data is disguised.

Simplify security management

Streamline management of your entire security risk management portfolio, including McAfee DLP Endpoint, via the centralized McAfee ePolicy Orchestrator (ePO) 4.5 console.

Take data inventory

Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Windows Server 2003 with Service Pack 1 (SP1), 2003 R2

Desktop & Laptop Endpoints

  • Operating systems
    • Microsoft Windows 7 (32-bit)
    • Microsoft Windows Vista (32-bit)
    • Microsoft Windows XP Professional with SP1 or higher
    • Microsoft Windows 2000 with SP4 or higher
  • Hardware requirements
    • CPU: Intel Pentium III 1 GHz or faster
    • RAM: 1 GB, 2GB (recommended)
    • Disk space: 200 MB

Resources

Data Sheets

McAfee DLP Endpoint

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • RSA Conference 2015: Shaking Up Security
    McAfee Enterprise - April 14, 2015

    With RSA Conference drawing near, the information security industry is abuzz. In today’s digital, always-on (rather, always-online) world, it is more critical than ever to keep data protection top of mind. RSA Conference provides an open forum for security professionals to do just that, from learning the latest industry trends to exchanging ideas on how […]

    The post RSA Conference 2015: Shaking Up Security appeared first on McAfee.

  • Do you have a mobile wallet?
    Cybermum Australia - April 13, 2015

    We recently had a credit card fraud situation in our house. Not only was it very concerning but very time consuming. It literally took hours: cancelling payments and then re-establishing them again with the gym, the schools and array of transport cards. And the worst thing – having to wait until the new cards arrived […]

    The post Do you have a mobile wallet? appeared first on McAfee.

  • Hidden Low Hanging Avaya IP Office Default Credentials
    McAfee Foundstone Professional Services - March 30, 2015

    Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]

    The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.

  • Millions of customers’ data up for sale as RadioShack goes out of business
    Gary Davis - March 26, 2015

    When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]

    The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.

  • Shifting the Focus: Cybersecurity as an Enabler
    Tom Gann - March 25, 2015

    For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches.  While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]

    The post Shifting the Focus: Cybersecurity as an Enabler appeared first on McAfee.