Offerings :: DLP


McAfee Data Loss Prevention


Protect vital information against theft and inadvertent loss


McAfee data loss prevention guards sensitive privacy data and hard-to-control financial data, source code, formularies, and designs. We remove complexity and manual analysis to help you activate persistent, deep protection quickly and prevent accidental or malicious data loss.


McAfee Device Control


Regulate the use of removable media on your network

It's 5 p.m. Do you know where your data is? In a McAfee-sponsored survey, more than half of respondents admitted to using portable devices to take confidential data out of their business every week. That's frightening by anyone's standard. McAfee Device Control helps you monitor and restrict data copied to removable storage devices and media to keep it from leaving company control.


Key Benefits:

  • Protect your business from the risks of data loss

    Avoid the disaster that a data loss could spell: brand damage, customer distrust, noncompliance penalties, competitive disadvantage, financial losses, and more

  • Gain visibility and control over your data

    Monitor and regulate how your employees transfer data to removable media such as USB drives, MP3 players, CDs, DVDs, and Bluetooth devices—even when users are not connected to the corporate network

  • Maintain operational productivity

    Specify detailed hardware- and content-based filtering, monitoring, and blocking of confidential data on any removable storage device; ensure that employees continue to safely use allowed devices as part of their daily work activities

  • Centralize management with ePolicy Orchestrator

    From a single, centralized console, implement and enforce security polices that prevent confidential data from leaving the company's control and being lost or stolen; reduce management effort, time, and training

  • Prove compliance with less effort

    Monitor real-time events and generate detailed reports to demonstrate compliance with internal and regulatory privacy requirements to auditors, board members, and other stakeholders


Key Features:

  • Comprehensive device and data management

    Regulate how users copy data to USB drives, iPods, recordable CDs and DVDs, Bluetooth and infrared devices, imaging equipment, COM and LPT ports, and more; block any copy attempts that violate your policies; protect all data formats, even when modified

  • Granular controls

    Specify which devices can and can't be used by any Windows device parameter, including product ID, vendor ID, serial number, device class, and device name; for devices that can be used, specify what content can and can't be copied onto those devices

  • Centralized management

    Centrally define, deploy, manage, and update security policies and agents throughout your environment; set device and data policies by user, group, or department

  • Advanced reporting and auditing capabilities

    Support compliance with detailed user- and device-level logging; gather details such as device, time stamp, and data evidence for prompt and proper audits



Follow Us

Linkedin Twitter Blog



Parent Site

© 2011-2016 Gateway Group of Companies