McAfee DLP Monitor allows you to gather, track, and report on the data in motion across your entire network, over time. Building a wealth of information about data usage patterns supports better decision making and provides greater insight. By detecting more than 300 content types traversing any port or protocol, Network DLP Monitor easily uncovers unknown threats to your data so you can quickly take action to protect it.
Examine network traffic — DLP Monitor’s industry-leading data scanning and analysis examines network traffic at a deeper level than any other solution on the market.
Quickly identify data — Real-time discovery quickly details how data is being used, who is using it, and where it’s going, providing you with information you can act on. DLP Monitor stores all analysis and classification results in a secure, easily searchable database, so you can assess risk, ensure compliance, and protect sensitive data.
Find and analyze all sensitive information traveling across the network, and then easily create rules to prevent future risks.
Filter and control sensitive information, monitor file-share access, and index, query, and analyze all content. You don’t need to know the location of data and what format it is in — McAfee DLP Monitor does all the hard work for you.
Avoid lengthy cycles of trial and error when building rules. DLP Monitor compiles a wealth of knowledge about how your information is used on your network so you can test policies, identify trends, and effectively protect your sensitive data.
View comprehensive reports about information, including who sent it, where it went, and how it was sent.
Streamline remediation by alerting senders, recipients, content owners, and system administrators with configurable notification messages.
Ensure support for over 300 content types, including Microsoft Office documents, multimedia files, source code, design files, encrypted files, and archives.
Gather a comprehensive picture of all the data handling activities performed by systems and users — an invaluable online record of data use that is critical to explore the chain of custody for any given data item.
Get built-in policies and rules for regulatory requirements, including PCI, GLBA, HIPAA, SOX, personally identifiable information, patient health information, SSN, CCN, stripe data, financial information, and more. Policies can also manage intellectual property assets, including source code, internal memos, product documents, patent applications, business strategy documents, and pricing information.
McAfee DLP Manager, McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent are now supported on the McAfee DLP 5500 appliance. The DLP 5500 appliance is an Intel-based platform with dual six core CPUs, 32 GB of RAM and over 10 TB of storage in a 2U form factor. DLP hardware appliance solutions are self-contained devices. There are no minimum software or hardware system requirements or additional database installations required.
The Network DLP 4400, Network DLP 1650, and Network DLP 3650 appliances have been discontinued. In accordance with McAfee’s End of Life policy, they are being supported until October 2016.
For a technical summary on the McAfee product listed above, please view the product data sheet.
Together, Boldon James Classifier and McAfee Network Data Loss Prevention reduce the risk of data loss by applying the insight of each knowledge worker to data loss prevention decisions. Classifier captures the user’s knowledge of the business value of data in the form of visual and metadata markings applied to messages and documents.
In today’s digital computing world there is a device and application for almost everything we do. I wake up in the morning to the sound of an alarm that was set on my smart phone. I then take a glimpse into my day and check emails, calendars and the weather. Minutes later, I text my […]
The post To Make Security Work for Work, Companies Need to Invest in Automatic Solutions appeared first on McAfee.
Every dog has its day, and for data privacy that day is January 28, 2015. What the average person may consider just another Wednesday is an important day for those of us in the cybersecurity community. Data Privacy Day is the perfect reminder of the need to educate and safeguard both businesses and consumers alike. And […]
The post Data Privacy Day: Making the World a Safer Place Through Education appeared first on McAfee.
It’s fair to say that 2014 was the year of the data breach with frequent high-profile incidents compromising personal customer information and credit card details. That’s backed up by PwC’s Global State of Information Security survey of almost 10,000 business and IT executives, which shows the number of incidents detected up 48 per cent on […]
The post Can your organisation detect and report a data breach within 72 hours? appeared first on McAfee.
In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents, Excel workbooks, and executable files. Recently we have seen a similar infection method that attacks PDF, MSI (Windows installer), and executables, though the current malware is not as complex as XDocCrypt. W32/PDFCrypt is not complex. The coding standards, propagation methods, stealth […]
This is part I in a series on proactive defense using a proven professional services security methodology When my credit card got declined at the gas station I remembered a term I’d recently read in an article about a large retailer’s data breach. The term is “vulnerability-fatigue,” where news of a recent disaster is ignored […]
The post Defending Against a ‘New Normal’ through Relevance appeared first on McAfee.