McAfee DLP Manager provides a flexible, efficient, and cost-effective data control solution, delivering streamlined incident monitoring, dynamic searching, and easy policy building. DLP Manager allows you to configure, control, and monitor all McAfee DLP components from a single interface.
Gain incident visibility — DLP Manager allows you to view all incidents generated by McAfee DLP anywhere in your network.
Quickly create reports — With DLP Manager, you can quickly generate reports that cover one, multiple, or all McAfee DLP components, and combine incidents and cases as needed to fit your workflow.
Perform sensitive data searches — DLP Manager allows you to perform searches against all McAfee DLP components to find sensitive data, learn how it is used, fine-tune rules, and validate policies on the fly.
Get started quickly — You can deploy preconfigured policies for common regulations such as HIPAA and PCI.
Expedite setup with built-in roles — DLP Manager’s built-in roles expedite setup for key team members. You can add custom administration roles, allowing any user to configure, manage, monitor, and respond to any data or incident within their control.
Configure, manage, and monitor all DLP components with the familiar McAfee ePolicy Orchestrator (ePO) platform, and create comprehensive dashboards and reports from one central console.
Determine who views specific incidents, from general risk reporting to detailed incident information. Protect sensitive information with data changes right in the management user interface.
Configure, manage, check status, and view all alerts from a single console. Quickly hand off cases and incidents between authorized administrators.
Consolidate and address group-related incidents that require remediation. Easily track multiple incidents and cases, and escalate incidents to different users. Access a detailed case history, export cases for offline viewing, and send email notifications to case owners if a change is made.
Access a centralized view of all incidents that were generated by any McAfee DLP component. Generate reports that cover one, multiple, or all McAfee DLP components. Automate reporting with prepackaged, configurable reports that you can schedule for automatic email delivery in multiple formats.
Search, mine, and analyze data. Find sensitive data, learn how it is used, fine-tune rules quickly, and validate rules on the fly.
Quickly filter information to get to specific data of interest. Automatically create filters by selecting data values, and easily add, remove, and compound filters.
Configure and manage any McAfee DLP component from a single interface, the McAfee ePO platform, and easily check the status of CPU utilization, disk utilization, and network throughput. View remediation alarms and alerts generated by any managed McAfee DLP component.
Distribute polices and rules for all, or specific, data loss vectors. Configure and distribute action rules, including email notification, encryption, quarantining, redirection, bouncing, and blocking.
Correlate incidents into a customizable dashboard. Escalate incidents through a flexible embedded case management tool and delegate responsibility for a specific incident and/or case among key users. Rules affected by workflow changes are easily updated.
Expedite setup using preconfigured roles for key members of teams within the organization, including administrators, legal, human resources, compliance, operations, and information security. Assign permissions to a role with high granularity and define additional roles with a few mouse clicks. Integrate with LDAP or Microsoft Active Directory for centralized authentication services.
McAfee DLP Manager, McAfee DLP Monitor, McAfee DLP Discover, and McAfee DLP Prevent are now supported on the McAfee DLP 5500 appliance. The DLP 5500 appliance is an Intel-based platform with dual six core CPUs, 32 GB of RAM and over 10 TB of storage in a 2U form factor. DLP hardware appliance solutions are self-contained devices. There are no minimum software or hardware system requirements or additional database installations required.
The Network DLP 4400, Network DLP 1650, and Network DLP 3650 appliances have been discontinued. In accordance with McAfee’s End of Life policy, they are being supported until October 2016.
For a technical summary on the McAfee product listed above, please view the product data sheet.
A couple of months ago I participated in a Twitter Chat with IT World Canada which was fast, furious and a lot of fun. A few questions came up that I should address in a couple of blogs; (1) what should people look for when selecting an encryption solution, and (2) how do those encryption […]
The post More Choices for Encryption to Protect Your Data-At-Rest appeared first on McAfee.
Last month many Internet users were suddenly forced to trade in Bitcoins. This was not for general purposes–they were paying to get their data back. Their systems had been hijacked by ransomware. Ransomware is a type of malware that infects a machine, locks data files or the entire system, and demands payment to free the […]
Retailers all over the world lose sleep over data breaches—and CSOs and IT security managers work hard to make sure that cyber thieves stay out of their endpoints and networks. They are layering on more anti-malware solutions, tighter defenses at email and web gateways, stronger next-generation firewalls, and more efficient intrusion prevention systems. But with […]
The post No Exit: How to Keep Data from Escaping via POS Systems appeared first on McAfee.
Targeted email attacks, often known as spear phishing, are one of the most prevalent threats to businesses today. The nature of these attacks makes them difficult to detect – many are sent to just to one or a handful of contacts in a chosen company. Even more so, the emails themselves are often so convincing […]
Among the mounds of information the 2014 Verizon Data Breach Investigations Report (DBIR) provides us, a single figure tells the sad story when it comes to comparing between the time it takes to successfully breach a target and the time it takes to discover the compromise. Figure 13 of the report illustrates how long it […]
The post The 2014 Verizon DBIR Report: Time-to-Compromise vs. Time-to-Discovery appeared first on McAfee.