Enforce data loss prevention policies across all custom applications
Unified DLP Reporting and Remediation
McAfee reports on DLP violations across all custom applications and other cloud services in a unified interface and provides multi-tier remediation options including notify administrator, encrypt, and block.
Deep Integration with On-Premises DLP Solutions
With McAfee you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as Symantec DLP, Intel McAfee DLP, Forcepoint DLP, and more.
McAfee enforces access control policies based on user groups, device, activity, and geography with coarse blocking and granular activity-level permissions. McAfee integrates with EMM/MDM solutions to enforce distinct access policies based on device management status, such as allowing unmanaged devices to preview in the browser but not download files.
McAfee captures an audit trail of all user activity in custom applications and supports post-incident forensic investigations as part of McAfee’s complete incident response workflow.
Protect unstructured data stored in custom applications with standards-based AES encryption. MVISION Cloud integrates with any KMIP-compliant key management server, enabling enterprises to maintain control of encryption keys and comply with industry regulations and internal security policies.
McAfee extends visibility and security controls to custom applications without making changes to the application code. AI-Driven Activity Mapper automatically maps the signature of any application against a uniform set of canonical activities, enabling standardized controls across applications.
Detect internal and external threats
Insider and Privileged User Threats
McAfee automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.
McAfee detects compromised account activity in custom applications based on brute force login attempts, logins from new and untrusted locations, and consecutive login attempts from two locations in a time period that implies impossible travel – even if the two logins occur across multiple cloud services – to support immediate remediation and limit exposure.