Benefits:
Identify data leakage risks
Scan information stored on all
accessible resources to identify where
sensitive data is stored and who the
content owner is
Create policies and
customized reports
Perform queries and then transfer
results to a protection rule (create
custom or use pre-built compliance,
corporate governance, and intellectual
property policies) then register
sensitive information to adjacent
information security systems
Classify, analyze, and
remediate data leaks
Filter and control sensitive
information with multi-vector
classification; index all content then
query and mine it; register and generate
signatures to protect information; and
send an alert notification if content
violates protection policies
¡@
Features:
Intuitive and unified policy
creation
Protect information with
built-in policies, a powerful rule
construction engine, rule validation,
integration with adjacent security
vectors and exclusion of public
documents and common text
Network scanning
Automatically scanning all accessible
resources as well as operations based on
specific parameters
Incident workflow and case
management
Review and remediate violations
from risk dashboards, which show the
profile of policy violations and
generate reports
Index and store policy
violation data
Capture, search and analyze stored data
related to sensitive information and any
policy violations
Complex data classification
Build a highly-accurate, multi-vector
classification to filter and control
sensitive information and to perform
searches that identify hidden or unknown
risks
¡@
Description:
From source code to trade secrets to strategic business plans, IP and other information assets are critical to your brand, public reputation and competitive edge. Protecting data during transmission is critical, but securing sensitive data before it is inappropriately accessed or moved and understanding where it resides should be your first line of defense.
McAfee Network Data Loss Prevention Discover allows you to verify whether sensitive data may be at risk and to know where it has been distributed. It can even identify complex sensitive data, such as Intellectual Property (IP) assets that are harder to define than fixed data like credit card or Social Security numbers.
Determine What Information to Protect
To identify information and
proliferation risks, McAfee Network DLP
Discover can be configured to scan specific
repositories and identify data for explicit
protection. Additionally, all data crawled
by McAfee Network DLP Discover is indexed
and made accessible through an intuitive
interface.
Define Policies for Protection
McAfee Network DLP Discover provides
intuitive and unified policy creation,
reporting, and management to give you more
control over your information-protection
strategy for data at rest.
Scan Your Network for Violations
After policies are defined, McAfee
Network DLP Discover can be instructed to
routinely scan network resources for policy
violations. Flexible scheduling options are
available to perform continuous, daily,
weekly, or monthly scans. McAfee Network DLP
Discover also automatically scans all
accessible resources, including laptops,
desktops, servers, document repositories,
portals, and file-transfer locations, for
policy violations.
Review and Remediate Violations
McAfee Network DLP Discover eliminates
or minimizes proliferation of sensitive
material through integrated incident
workflow and case management. If McAfee
Network DLP Discover finds content that
violates protection policies, it generates
incidents and sends notifications.
Capture and Analyze Stored Data
McAfee Network DLP Discover indexes all
content found at rest in the network and
provides you with the ability to query and
mine this information to understand your
sensitive data. McAfee Network DLP Discover
lets you quickly understand your sensitive
data, how it is used, who owns it, where it
is stored, and to where it has proliferated.