Prevent unauthorized data from being shared externally

McAfee summarizes all collaboration activities with internal users, external partners, and personal emails along with sharing via anonymous links. Real-time policy enforcement ensures files in Office 365 are shared according to corporate policy. Layer in content rules and enforce remediation actions to remove permissions, downgrade permissions, and revoke links.

Insider and Privileged User Threats

McAfee automatically constructs a behavior model with dynamic and continuously updated thresholds for each user and team to identify activity indicative of insider threat, whether the threat is accidental or malicious. Privileged User Analytics identifies risk from dormant administrator accounts, excessive permissions, and unnecessary escalation of privileges and user provisioning.

Compromised Accounts

McAfee detects compromised account activity in Office 365 based on brute force login attempts, logins from new and untrusted locations for a specific user, and consecutive login attempts from two locations in a time period that implies impossible travel, even if the two logins occur across two cloud services. Darknet Intelligence reveals user accounts for sale online that are at risk of compromise.

Enforce data loss prevention policies across Office 365

McAfee CASB enforces DLP policies across data at rest and in motion to ensure compliance with regulations and internal policies. McAfee supports DLP rules based on keywords, data identifiers, user groups, and regular expressions. Enforcement actions include coach users, notify administrator, block, encrypt, quarantine, tombstone, and delete. Leverage pre-built industry templates, create custom policies in McAfee, or leverage policies in an existing on-premises DLP solution.

Unified DLP Reporting and Remediation

McAfee reports on DLP violations in all Office 365 applications and other cloud services in a unified interface with highlighted excerpts revealing the exact content that triggered the DLP policy. During review, if a file does not violate a policy, the reviewer can rollback the remediation action to restore the file and/or its sharing permissions. Quarantined files are stored in a secure account within Office 365, not in McAfee’s platform, for added security.

Deep Integration with On-Premises DLP Solutions

With McAfee, you have the option of leveraging our best-in-class DLP engine or the policies in your existing on-premises solution such as McAfee DLP, Symantec DLP, Forcepoint DLP, and more. McAfee optionally performs a first-pass content inspection, brokers inspection by the on-premises solution, acts as an enforcement point to apply policies to data in the cloud and registers enforcement in the on-premises solution that maintains the policy.

Key features

Cloud Data Loss Prevention

Enforces DLP policies based on data identifiers, keywords, and structured/unstructured fingerprints across data at rest, uploaded, shared in real time or via email (Exchange Online).

Pre-Built DLP Templates

Provides out-of-the-box DLP templates and a broad range of international data identifiers to help identify sensitive content such as PII, PHI, or IP.

Unstructured Data Fingerprinting

Fingerprints sensitive files and detects exact match and partial or derivative matches with a policy-defined threshold for percentage similarity to the original.

Policy Violation Management

Offers a unified interface to review DLP violations, take manual action, and rollback an automatic remediation action to restore a file.

Closed-Loop Policy Enforcement

Optionally leverages policies in on-premises DLP systems, enforces policies, and registers enforcement actions in the DLP system where the policy is managed.

Secure Collaboration

Enforces real-time external sharing policies based on domain whitelist/blacklist and content and educates users on acceptable collaboration policies.

Structured Data Fingerprinting

Fingerprints billions of unique values stored in enterprise databases and systems of record and supports exact match detection of each value.

Multi-Tier Remediation

Provides coach user, notify administrator, block, apply rights management, quarantine, tombstone, and delete options and enables tiered response based on severity.

Match Highlighting

Displays an excerpt with content that triggered a DLP violation. Enterprises, not MVISION Cloud, store excerpts, meeting stringent privacy requirements.

Shadow IT Discovery

Discovers all shadow IT cloud services employees are using in place of the corporate standard, OneDrive, Teams, and Sharepoint.

On-Demand Data Scan

Identifies sensitive data stored at rest in Office 365 with the ability to target scans based on date range, user, sharing status, and file size.

Coaching and Enforcement

Displays just-in-time coaching messages guiding users from unapproved services to Office 365 and enforces granular policies such as read-only access.

Collaboration Analytics

Visually summarizes sharing with third-party business partners, personal emails, and internal users and reports on policy exceptions.

Office 365 SOC

Delivers a threat dashboard and incident-response workflow for insider threats, privileged user threats, and compromised accounts.

User Behavior Analytics

Automatically builds a self-learning model based on multiple heuristics and identifies patterns of activity indicative of a malicious or negligent insider threat.

Privileged User Analytics

Identifies excessive user permissions, inactive accounts, inappropriate access, and unwarranted escalation of privileges and user provisioning.

Guided Learning

Provides human input to machine learning models with real-time preview showing the impact of a sensitivity change on anomalies detected by the system.

Cloud Activity Monitoring

Provides a comprehensive audit trail of all user and administrator activities to support post-incident investigations and forensics.

Account Compromise Analytics

Analyzes login attempts to identify impossible cross-region
access, brute-force attacks, and untrusted locations indicative of compromised accounts.

Malware Protection

Identifies and blocks known signatures, sandboxes suspicious files, and detects behavior indicative of malware exfiltrating data via cloud services and ransomware.

Contextual Access Control

Enforces policies based on user, managed/unmanaged
device, personal/corporate account, and geography with coarse and activity-level enforcement.

Encryption and Tokenization

Delivers peer-reviewed, function-preserving encryption schemes using enterprise-controlled keys, and tokenization for data at rest and in transit.

Contextual Authentication

Forces additional authentication steps in real-time via integration with identity management solutions based on
pre-defined access control policies.

Information Rights Management

Applies rights management protection to files uploaded to or downloaded from Office 365, ensuring sensitive data is protected anywhere.

MVISION Cloud Gateway

Enforces policies with an inline proxy and steers traffic via device agent, proxy chaining, DNS, and identity providers to cover all access scenarios.

MVISION Cloud Enterprise Connector

acilitates integration with firewalls, proxies, SIEMs, directory services via LDAP, on-premises DLP, HSMs, and EMM/MDM solutions and tokenizes sensitive data.

Integration with SIEMs

Collects log files from SIEMs and provides the ability to report on incidents and events from MVISION Cloud in SIEM solutions via syslog and API integration.

Integration with IRM

Integrates with leading information rights management systems to enforce existing policies across sensitive data.

MVISION Cloud Connector

Connects to cloud services via cloud provider APIs to provide visibility and enforce security and compliance policies for all users and cloud-to-cloud activity.

Integration with On-Premises DLP

Provides integration and closed-loop remediation with existing on-premises DLP solutions such as McAfee, Symantec, and Forcepoint.

Integration with IDM

Leverages identity management (IDM) solutions for pervasive and seamless traffic steering through MVISION Cloud's proxy and contextual authentication.

Integration with EMM/MDM

Integrates with enterprise mobility management solutions to enforce access control policies based on whitelisted devices and EMM/MDM certificates.

Free Demo

Request

Free Cloud Audit

Request