Know your gear
The more people share information electronically, the greater the likelihood that someone will inadvertently, or intentionally, send sensitive data to an unauthorized individual - and put confidential corporate data at risk. Whether by email, web, instant messaging (IM), or FTP, information can leave the company across many different electronic channels. This creates a tremendous challenge for corporate security and compliance officers. Some messages or transactions are allowable, but should be encrypted to ensure data privacy. Other types of messages, or their recipients, are simply unacceptable at any time and these transmissions must be blocked. Enforcing the right policies at the right time is essential to ensuring data security, regulatory compliance, and intellectual property protection.
McAfee Network Data Loss Prevention (DLP) Prevent enforces policies for information leaving the network through email, webmail, Instant Messaging, wikis, blogs, portals, HTTP/HTTPS, and FTP transfers by integrating with Message Transfer Agent (MTA) gateways using Simple Mail Transfer Protocol (SMTP) or ICAP-compliant web proxies. Upon encountering a policy violation, McAfee Network DLP Prevent allows you to take a variety of actions, including applying encryption, blocking, redirecting, quarantining and more - so you can ensure compliance with regulations governing the privacy of sensitive information and reduce the risk of security threats.
McAfee Network Data Loss Prevention (DLP) Prevent enforces policies for information leaving the network through email, webmail, Instant Messaging, wikis, blogs, portals, HTTP/HTTPS, and FTP transfers by integrating with Message Transfer Agent (MTA) gateways using Simple Mail Transfer Protocol (SMTP) or ICAP-compliant web proxies. Upon encountering a policy violation, McAfee Network DLP Prevent allows you to take a variety of actions, including applying encryption, blocking, redirecting, quarantining and more - so you can ensure compliance with regulations governing the privacy of sensitive information and reduce the risk of security threats.