McAfee DLP Endpoint

McAfee DLP Endpoint

Integrated and comprehensive endpoint data protection

Next Steps:

Overview

McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.

Enhanced virtualization support — Enforces per-user policy for multiple sessions and VDIs, which allows flexibility and better control of the data flowing to the shared terminals.

Time-saving file tagging — Helps organizations set up time-saving policies based on location and application types. Security policies are preserved against file manipulation and transformation.

Ironclad IP protection — Protects product designs and source codes against intentional and unintentional data loss by enforcing clipboard protection for both "Copy From" and "Paste To" actions, in addition to the new screen capture (e.g., SnagIt) protection tools.

Streamlined data encryption — Integrates with McAfee Endpoint Encryption to automate content-aware data encryption policies.

Centralized Management Console — Leverages McAfee ePolicy Orchestrator (ePO) management console to define policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements.

Features & Benefits

Protect your enterprise from the risks of data loss

Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers.

Safeguard all layers of your infrastructure

Ensure that your confidential information is protected throughout your network — on servers, in databases, and across endpoints.

Prove compliance with less effort

Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements.

Control data transfer

Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels — even when data is disguised.

Simplify security management

Streamline management of your entire security risk management portfolio, including McAfee DLP Endpoint, via the centralized McAfee ePolicy Orchestrator (ePO) 4.5 console.

Take data inventory

Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

McAfee ePolicy Orchestrator (ePO) Server

  • Operating systems
    • Microsoft Windows Server 2003 with Service Pack 1 (SP1), 2003 R2

Desktop & Laptop Endpoints

  • Operating systems
    • Microsoft Windows 7 (32-bit)
    • Microsoft Windows Vista (32-bit)
    • Microsoft Windows XP Professional with SP1 or higher
    • Microsoft Windows 2000 with SP4 or higher
  • Hardware requirements
    • CPU: Intel Pentium III 1 GHz or faster
    • RAM: 1 GB, 2GB (recommended)
    • Disk space: 200 MB

Customer Stories

Sicredi

Sicredi, one of Brazil’s largest credit union systems, consolidated their comprehensive security environment with Intel Security.

Resources

Data Sheets

McAfee DLP Endpoint

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • What is the Cloud?
    Robert Siciliano - May 25, 2015

    You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may […]

    The post What is the Cloud? appeared first on McAfee.

  • Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool
    Umesh Wanve - May 19, 2015

    Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]

    The post Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Teach Your Mom to be a Sure & Safe Netizen
    Anindita Mishra - May 10, 2015

    Mother’s Day Role Reversal for Young Techies Remember those times when you frowned and squinted, tongue held between your teeth, as your mom guided your little hand over the cursive letters? Remember how she patiently spent hours teaching you the alphabets and numbers? This Mother’s Day, acknowledge her extraordinary contribution in creating a literate you […]

    The post Teach Your Mom to be a Sure & Safe Netizen appeared first on McAfee.