McAfee DLP Prevent protects against data loss by ensuring that data only leaves the network when appropriate — whether through email, webmail, instant messenger, wikis, blogs, portals, HTTP/HTTPS, or FTP transfers. If a policy violation is detected, DLP Prevent can, at your choice, encrypt, redirect, quarantine, or even block the data transmission in question. This supports compliance with privacy regulations and reduces the likelihood of data breaches, while enabling legitimate data use.
Scan inbound/outbound network traffic — DLP Prevent delivers comprehensive scans of inbound and outbound network traffic across all ports, protocols, and content types.
Automatically identify over 300 content types — Using comprehensive data classification, DLP Prevent automatically identifies and protects more than 300 different content types (including complex computer aided design (CAD) files) in over 13 languages.
Gain visibility to security incidents — Customized views and incident reports provide summary and detailed views of security incidents and the mediation actions taken.
Protect more than 300 standard content types, including Microsoft Office documents, multimedia files, source code, design files, archives, encrypted files, built-in policies, and intellectual property, as well as sensitive information in exotic data formats through the use of customer filters.
Report all incidents to our centralized incident management console for access by any authorized user for follow-up, delegation, or inclusion in new or existing cases.
Filter and control sensitive information, and index and enforce fine-grained security policies for all content.
Facilitate a seamless integration with a broad range of commercial email and web gateway products (standards-based integration via simple mail transfer protocol (SMTP) and Internet content adaptation protocol (ICAP)).
Establish common, enterprise-wide policies to ensure that data protection is uniformly enforced out to the network boundary.
Use built-in policies and rules for common regulatory requirements, including PCI, GLBA, HIPAA, SOX, personally identifiable information, patient health information, SSN, CCN, stripe data, financial information, and more. Network DLP Prevent also provides built-in policies for intellectual property assets (e.g., source code, internal memos, product documents, and pricing information).
Get integrated case management with configurable notification messages for senders, recipients, content owners, and system administrators. You can enable traffic enforcement through ICAP integration with ICAP-compliant web proxies for mitigating content violations over IM, FTP, HTTP, HTTPS, and webmail. You can enable mail enforcement through SMTP integration with mail transfer agent (MTA) devices.
Customize summary and detail views of incident logs and search results with DLP Prevent’s powerful analytics engine. You can create reports with optional trending data on demand or schedule for regular delivery. The system comes with over 20 preconfigured, customizable reports to get you started.
McAfee DLP Manager, McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent are now supported on the McAfee DLP 5500 appliance. The DLP 5500 appliance is an Intel-based platform with dual six core CPUs, 32 GB of RAM and over 10 TB of storage in a 2U form factor. DLP hardware appliance solutions are self-contained devices. There are no minimum software or hardware system requirements or additional database installations required.
The Network DLP 4400, Network DLP 1650, and Network DLP 3650 appliances have been discontinued. In accordance with McAfee’s End of Life policy, they are being supported until October 2016.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Together, Boldon James Classifier and McAfee Network Data Loss Prevention reduce the risk of data loss by applying the insight of each knowledge worker to data loss prevention decisions. Classifier captures the user’s knowledge of the business value of data in the form of visual and metadata markings applied to messages and documents.
Written by Piyush Mittal. Default credentials are considered to be the most common, low hanging fruit, in the field of information security that is frequently exploited by the hackers as they are easily identifiable and exploitable. In this blog we will go through the default credentials for Avaya IP office, which can be used by […]
The post Hidden Low Hanging Avaya IP Office Default Credentials appeared first on McAfee.
When a company goes out of business, its assets—including stores, trademarks, furniture and signs—are sold off. The term for this is called liquidation—the business equivalent of an estate sale. Regardless of terminology, everything is sold. And in the case of RadioShack, a once shimmering empire of electronic memorabilia, ‘everything’ includes your data. Yes, if you […]
The post Millions of customers’ data up for sale as RadioShack goes out of business appeared first on McAfee.
For too long, the cybersecurity industry has focused over-much on doom and gloom topics such as massive hacks and breaches. While it’s true that it’s still a dangerous world out there, it’s also true that cybersecurity can play a powerful role in improving the lives of all citizens. The right cybersecurity can enable technologies that […]
When social media really took off about 10 years ago, I think many of us assumed that it might just provide the perfect platform for true freedom of expression. But has this really happened? Are we sharing our convictions and opinions on our Twitter feeds and Facebook pages? Apparently not. A study conducted by The […]
The post Are We Really Expressing Ourselves on Social Media, Or Are We Too Scared? appeared first on McAfee.
Being in love in the digital age is far more complicated than the ‘good ‘ole days’. The way we court and communicate has been turned on its head by the Internet. The fact that we can be ‘researched’ online, have our movements constantly analysed along with the constant obligation to be in touch with our […]