Content

Data Discovery and Protection

Seek, find, and secure sensitive data wherever it resides in your organization

Some companies only discover critical data after it has left the building on a laptop, a USB device, a smartphone, or over email. McAfee data discovery and protection solutions automatically seek, find, track, and secure sensitive data that’s often hidden among shared files and folders, reformatted in various applications, or stored on laptops and USB devices. When McAfee’s data discovery solutions are used hand-in-hand with our monitoring, encryption, and policy enforcement tools, you get seamless protection plus efficient, centralized management and quick proof of compliance.

Tab Navigation

Overview:

Key Benefits

  • Secure critical data in days, not weeks—Let our automated tools discover what data you have, where it resides, what applications use it, and where it travels—without depending on advance knowledge of definitions or weeks of trial and error.
  • Protect data and enhance workflow with strong, transparent encryption—Encrypt mobile devices and removable storage without end-user action to protect confidential and regulated information against loss, theft, and unauthorized access.
  • Support a broad range of mobile systems—Allow your users more freedom in the devices they use since you can scan USB storage, USB phones, laptops, and other mobile systems to detect and then accurately control sensitive data.
  • Save time and money with integrated coverage—Move seamlessly from discovery to monitoring to enforcement with our complete family of industry-leading endpoint- and network-based tools.
  • Protect data without slowing down business—Understand how your users really work with data so you can create policies and rules that won't drag down productivity.
  • Get a true, real-time view of your data—Monitor and capture your data use in real time and refine your data protections and policies as needed.
  • Enhance efficiency with a centralized management platform—Implement, enforce, manage, and audit your organization's security policies and all of its components from McAfee ePolicy Orchestrator (ePO), our web-based management console. McAfee ePO helps you quickly achieve, maintain, and demonstrate compliance with company and industry regulations.
  • Trust McAfee for proven expertise—Rely on protections built by a leader in mobile security. Our integrated content security has been shipped on more than 100 million mobile devices.

Products and Services:

Suites

McAfee Total Protection (ToPS) for Data—Protect your most sensitive data with end-to-end security

Products

McAfee Host Data Loss Prevention—Don't expect users to become security experts with your sensitive data

McAfee Network DLP Discover—Identify and protect sensitive data

McAfee Network DLP Monitor—Monitor the movement of your sensitive information

McAfee Network DLP Prevent—Enforce policies to protect your data in motion

Services

McAfee Foundstone Data Loss Prevention Assessment
Reduce risk of exposure as we identify sensitive data that has been copied or is currently in transit from its original intended container. This assessment captures and identifies assets on the network, as well as items on hard drives, covering data in motion and data at rest.

Take the Next Step

Learn more about how McAfee mobile security solutions can help keep your mobile workforce agile, and your portable data secure.