Product description
When you combine DLP Endpoint with Endpoint Encryption, the data encryption is content-aware which makes the encryption process more efficient. Managing host data loss prevention allows you to define and manage data protection policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console. Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers. Ensure that your confidential information is protected throughout your network - on servers, in databases, and across endpoints.
Product features
- Data transfer methodology
DLP Endpoint controls how you transfer data over the network, use it in applications, and copy it to removable storage devices. - Data protection regardless of format
Protect data in any format, even if it's modified, copied, pasted, compressed, or encrypted. - Controlling data sent to removable storage
Prevent data from being written to USB drives, iPods, and other removable storage devices, and stop data loss from endpoints by monitoring and preventing risky user behavior. - Streamlined data encryption
When you combine DLP Endpoint with Endpoint Encryption, the data encryption is content-aware which makes the encryption process more efficient. - Centralized management console
Managing host data loss prevention allows you to define and manage data protection policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console. - Protect your enterprise from the risks of data loss
Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers. - Safeguard all layers of your infrastructure
Ensure that your confidential information is protected throughout your network - on servers, in databases, and across endpoints. - Prove compliance with less effort
Generate detailed reports that show auditors, board members, and other stakeholders full compliance with internal and regulatory privacy requirements. - Control data transfer
Monitor and control the transfer of sensitive information to removable storage devices, via email and instant messaging (IM), and through other communication channels - even when data is disguised. - Take data inventory
Scan endpoints and discover what data resides on them. Use this information to mitigate risk, build an understanding of how your data is used, or simply compile and inventory data for use in cases such as legal discovery.