McAfee DLP Endpoint

Integrated endpoint data protection

Extend your data security

McAfee Data Loss Prevention (DLP) Endpoint helps to safeguard intellectual property and ensure compliance.

Gain control of data

Protect sensitive data such as PCI, PII, and PHI wherever it lives—on premises, in the cloud, or at the endpoints.

Track user behavior

Monitor and address day-to-day risky actions such as emailing, web posting, printing, clipboards, screen captures, device control, uploading to the cloud, and more.

Empower users

Allow users to run endpoint discovery scans and perform self-remediation actions.

Gain broader threat protection

Integrated with McAfee Threat Intelligence Exchange and Data Exchange Layer (DXL), McAfee DLP Endpoint communicates with DXL to block sensitive data in applications identified as malicious.

What’s New in McAfee DLP Endpoint 10.0

Manual classification

Empower end users to manually classify documents, increasing employee data protection awareness and reducing administration.

Enhanced Mac OS support

McAfee DLP Endpoint increases content-aware protection for Mac OS on removable storage, application file access, and network shares.

No required reboots

Increase administrative efficiency with no upgrade reboot required.

Five Tips to Help Protect Your Data

Based on real-world deployments and experience, here are five ways to enhance your DLP implementation.

System requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Platinum Support

McAfee ePolicy Orchestrator (ePO) Server

  • Supported McAfee versions
    • McAfee ePO 4.6.9 and 5.1.1
    • McAfee Agent for Windows 4.8 Patch 2 and 5.0
    • McAfee Agent for Mac 4.6 Patch 3, 4.8 Patch 2, and 5.0
  • Operating systems
    • Windows Server 2012 and 2012 R2 or later, 64-bit
    • Windows Server 2008 R2 and 2008 SP2 or later, 32-bit and 64-bit

 

Desktop & Laptop Endpoints

  • Operating systems
    • Windows 8 and 8.1 or later Enterprise and Professional, 32-bit and 64-bit
    • Windows 7 SP1 or later Enterprise and Business editions, 32-bit and 64-bit
    • OS X Yosemite
    • OS X Mavericks
    • OS X Mountain Lion
  • Virtual environments
    • Citrix XenApp 6.0 or later
    • Citrix XenDesktop 5.5 or later
    • VMware View 4.6 or later
  • Hardware requirements
    • CPU: Intel Pentium III 1 GHz or faster
    • RAM: 1 GB, 2GB (recommended)
    • Disk space: 200 MB
  • Browsers
    • Google Chrome 31 or later
    • Microsoft Internet Explorer 8 or later
    • Mozilla Firefox 34 or later
 

Need additional technical resources? Visit the McAfee Expert Center >

Learn more about McAfee DLP Endpoint

Data Sheet

McAfee DLP Endpoint

McAfee DLP Endpoint safeguards intellectual property and ensures compliance by protecting sensitive data such as PCI, PII, and PHI wherever it lives—on premises, in the cloud, or at the endpoints.

Read Data Sheet >
Solution Brief

Keep Your Data Safe for Office 365

Address risky employee behavior by protecting sensitive data from day-to-day user actions.

Read Solution Brief >

McAfee DLP Endpoint related products

McAfee Device Control protects against data loss by monitoring and controlling data transfers from PCs to removable storage devices such as USB drives.

Learn More >

McAfee Data Loss Prevention (DLP) Discover finds your sensitive data even if the location is unknown. Using advanced network crawling technology, it searches systems based on LAN segment, IP address range, network group, and many other easily defined criteria.

Learn More >

McAfee Data Loss Prevention (DLP) Monitor provides industry-leading data protection scanning and analysis that examines network traffic at a deeper level than any other data protection solution on the market.

Learn More >

McAfee Data Loss Prevention (DLP) Prevent delivers comprehensive scans of inbound and outbound network traffic across all ports, protocols, and content types.

Learn More >

McAfee Total Protection for Data Loss Prevention enables you to be proactive about data protection, and ensures that you create effective information protection policies.

Learn More >

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us