Software Details
- Subscription license (1 year) + 1 Year Business Software Support
- volume
- Win, Mac
- 1 user
- level B (26-50)
Know your gear
McAfee DLP Endpoint delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices. DLP Endpoint controls how you transfer data over the network, use it in applications, and copy it to removable storage devices. Protect data in any format, even if it's modified, copied, pasted, compressed, or encrypted. Prevent data from being written to USB drives, iPods, and other removable storage devices, and stop data loss from endpoints by monitoring and preventing risky user behavior.
When you combine DLP Endpoint with Endpoint Encryption, the data encryption is content-aware which makes the encryption process more efficient. Managing host data loss prevention allows you to define and manage data protection policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console. Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers. Ensure that your confidential information is protected throughout your network - on servers, in databases, and across endpoints.
When you combine DLP Endpoint with Endpoint Encryption, the data encryption is content-aware which makes the encryption process more efficient. Managing host data loss prevention allows you to define and manage data protection policies, deploy and update agents, monitor real-time events, and generate reports to meet compliance requirements, all from the centralized McAfee ePolicy Orchestrator (ePO) management console. Help protect your business against the financial loss, brand damage, and noncompliance penalties that come with accidental disclosure or data theft by insiders and hackers. Ensure that your confidential information is protected throughout your network - on servers, in databases, and across endpoints.