Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance appliances (physical or virtual) and McAfee ePolicy Orchestrator (ePO) platform, for streamlined deployment, management, updates, and reports.

  • Time-to-value deployment
    Unique, non-invasive Capture technology enables organizations to build and deploy DLP policies faster and more accurately without guesswork or trial and error.
  • Simplified policy management
    Flexible file tagging helps organizations set up time-saving policies based on location and application types. Data Classification technology categorizes large amounts of data so only relevant files are examined and remediated.
  • Proactive data protection
    The only DLP solution that keeps a record of all data leaving the network egress points — giving you visibility into how your sensitive information is being used. It enables you to identify and fix existing broken business processes therefore reducing risk of breach in the future.
Favoured:
0

Listing Details

Vendor
McAfee
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2013-07-11
Owner
michelemjordan
Add'l Info
DLP for a dynamic world
Created
2013-07-11
Tags
Audit, Compliance, Encryption, Monitoring
  • 503.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
    • - DLP Network
    • - Anti Spam Gateways
    • - Data Diodes
    • - Enterprise Appliance FW
    • - Enterprise Software FW
    • - SOHO Appliance FW
    • - Guards Mail
    • - Guards XML
    • - Guards Web
    • - Guards Net Mgmt
    • - Guards File Transfer
    • - Guards Authentication
    • - DDoS Mitigation
    • - IPS Evasion
    • - IPS Network
    • - Network Taps
    • - Load Balancers
    • - FW Mgmt and Test
    • - Firewall Next Generation
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message