McAfee DLP Endpoint
Every day companies like yours fall victim to massive data loss through malicious and unintentional leakage of information. The costs of data breaches and remediation are extremely high. What if you could easily and effectively stop data loss? What if you could meet industry and government compliance and protect intellectual property at the same time? Now you can—with the comprehensive McAfee® DLP Endpoint solution.
Protect and Comply
With McAfee DLP Endpoint, you can quickly and easily monitor real-time events and apply centrally managed security policies to regulate and restrict how employees use and transfer sensitive data without impacting employee productivity. You’ll protect data from threats originating from the inside, such as email, IM, web posting, USB copying, and printing. You can also stop confidential data loss initiated by Trojans, worms, and other file-sharing applications.
- Protection for all potential leaking channels including removable storage devices, email, web, printing, clipboard, screen capture, and network shares.
- Flexible classification including dictionaries, regular expressions and validation algorithms, registered documents, and support for third-party, end-user classification solutions, such as TITUS.
Unique tagging technology for identifying documents according to their origin. Protect sensitive information being copied from web applications, network applications, and network shares.
- Endpoint discovery for local drives and email archives to protect sensitive files and emails. Furthermore, it allows employees to self-remediate any compliance violations, such as PCI, and reduces manual involvement of DLP administrators.
- Enhanced virtualization support to protect remote desktops and VDI solutions.
- Fully customized user notification and business justification dialogues help reinforce end-user behaviors.
Control and Manage
Comprehensive device management helps control and block confidential data copied to USBs, flash drives, CD/DVDs, Apple iPods, and other removable storage devices. Device parameters such as product ID, vendor ID, serial number, device class, and device name can be specified and categorized. Furthermore, different policies, such as block or encrypt, can be enforced based on the content loaded onto the devices.
- Support for plug-and-play devices and removable storage devices.
- Removable storage devices can be blocked or made read-only.
- Content-aware protection for removable storage devices.
- Integration with McAfee Endpoint Encryption for file folders and digital rights management (DRM) solutions.
- File access protection for files that reside on removable storage devices.
- The Citrix device rule blocks access to the thin-client device mapping: local drives, removable storage, printers, CD/DVD, clipboard, and more.
- Non-system hard disks rule blocks and monitors read-only files and provides notifications of user actions on fixed disk drives.
Centralized Management Through McAfee ePO Software
Integration with McAfee ePolicy Orchestrator (McAfee ePO) software offers real-time event monitoring and centralized policy and incident management. It allows for easy collection of critical usage data, such as sender, recipient, time stamp, and data evidence. With a click of a button McAfee ePO software offers detailed reports to prove to auditors, senior management, and other stakeholders that internal and regulatory compliance measures are in place.
- Deploy and update McAfee DLP Endpoint agents via McAfee ePO software.
- Manage McAfee DLP Endpoint policies and incidents via McAfee ePO software.
- Integrate with McAfee ePO software for event monitoring, centralized reporting, and auditing capabilities.
- Set role-based access control (also known as separation of duties) by McAfee ePO software for incident review.
- Notify violators and/or managers automatically.
- Access helpdesk interface.
Soft Solutions Limited (SSL) partners with McAfee in Nigeria to bring the McAfee Suite of product that specializes in security across the enterprise. SSL is well positioned to provide companies with software applications that run on their IT infrastructure as well as the tools that help to manage that infrastructure. Supporting these product offerings are our various services that scale from basic support services to complete outsourcing services. Our solutions are organized in the following groups
- Process Improvement Solutions
- Security Infrastructure
- Network Performance Solutions
- Services Management Solutions
Soft Solutions has partnered with leading Networking & Security Solution providers to bring the best of the breed solutions to Nigeria over the last decade.
For more information, contact email@example.com or send a request.