McAfee Data Protection Suite for Rights Management automatically discovers sensitive data and applies policy-based usage and data access restrictions to safeguard critical information wherever it resides. McAfee’s data loss prevention technologies combined with Adobe’s LiveCycle Rights Management ES2 provides a comprehensive data protection solution that allows only authorized information to leave your organization. Data Protection Suite for Rights Management boosts control over your most business-critical data, and ensures you can safely work with partners, suppliers, and customers without worrying about data loss.
Discover sensitive data without any user interaction and eliminate inefficiencies inherent with manual process-based data protection solutions. Instantly scan local user drives to find sensitive data that needs to be protected and immediately assign a rights management (RM) rule based on your information security policies. User access rights are defined by individual, job title, job function, and other parameters.
Collaborate with third parties without worrying about data breaches. Dynamic and effective policy management ensures that company information sent to stakeholders, customers, vendors, suppliers, partners, and potential new business associates remains secure and doesn’t end up in the wrong hands. McAfee Data Protection Suite for Rights Management helps avoid costly and damaging data loss, and supports regulatory compliance.
Protect data sent via email, the web, and removable hard drives. Encrypted files can only be accessed by authorized users and the RM protection travels with the document, regardless of the device used to access the file.
Audit, revoke, change, or update user privileges to maintain control over data even after it leaves the organization. You can restrict access to data for a specific period of time, rescind a document, and alter authorized users or groups. Protection remains in place regardless of where users are located or the length of time they have the data.
Support a broad user base. Data Protection Suite for Rights Management works with Adobe Reader and Microsoft Office.
Protect commonly used file types, including PDF and Microsoft Office documents. Adobe Reader includes native support for rights management, giving you instant coverage for hundreds of millions of users. Microsoft Office documents are supported via a simple plug-in.
Find sensitive data on your local drives in real time and automatically apply RM usage policies from the Adobe LiveCycle server. Digital rights management protects files against unauthorized access, regardless of where the file resides or how it is distributed. Automated processes eliminate error-prone manual data discovery, lowering administrative overhead.
Stop data that does not have a RM applied from leaving your organization via email, web, or removable media device.
Ease data security management with the McAfee ePolicy Orchestrator (McAfee ePO) platform. Deploy, monitor, and generate actionable reports to boost security and support compliance. The McAfee ePO platform pushes data policies out to every corporate endpoint to ensure that all sensitive data is discovered. From a single console, easily manage security deployment and track, audit, and report on sensitive data access to meet compliance requirements.
These are minimum system requirements only. Recommended requirements are in parenthesis, where applicable. Actual requirements will vary depending on the nature of your environment.
* 32-bit and 64-bit versions may have different matrices
As a supplement to the latest McAfee Labs Threats Report, published this week, we offer this timeline of leading threats that made news in the fourth quarter of 2013. October 3: Adobe reports personal information relating to customer orders has been accessed in an attack on the company’s systems. The total amounts to 152 […]
Malware attacks not only jeopardize sensitive information, such as valuable customer data, but they also impact brand loyalty, vendor relationships, and investor commitment. As we’ve all seen with the latest retail issues, a serious intrusion may harm sales, customer confidence and even stock performance. Cybercriminals are frequently in the news for finding new and mindboggling […]
The post Managing a Security Breach, Part I: Crisis Communications appeared first on McAfee.
On Monday Kaspersky Labs announced the discovery of a large number of malware infections across large parts of the globe. Kaspersky has named this attack Careto, after what appears to be an internal name used by the attackers for one of the malware families involved. (The word careto in Spanish means ugly face or mask and […]
Last year we reported on the Athena HTTP botnet, which targets Windows XP systems, mostly for distributed denial-of-service attacks. Now we have examined the botnet Plasma HTTP, whose infections seem to be widespread and target all Windows systems. Attacker use this HTTP-based botnet primarily as a CPU and GPU cryptocurrency miner. Once a machine is […]
The post Plasma HTTP Botnet Steals Passwords From Chrome, FileZilla appeared first on McAfee.
Some would say that if encryption isn’t becoming ubiquitous, then it should be! Data breaches are in the news nearly every day now. Last week it was reported that in 2013, payment card data breaches jumped 5-fold, representing around 740M records exposed. Deploying encryption on a broad basis would at least help to reduce the […]