mcafee data protection n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
McAfee Data Protection PowerPoint Presentation
Download Presentation
McAfee Data Protection

Loading in 2 Seconds...

play fullscreen
1 / 28

McAfee Data Protection - PowerPoint PPT Presentation


  • 695 Views
  • Uploaded on

McAfee Data Protection. Total Protection Suite for Data (ToPS Data). Data Loss Prevention. Device Control. Endpoint Encryption. Encrypted USB. Printer. Print Screen. USB Copy. Monitor Usage. McAfee Data Loss Prevention. You need

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'McAfee Data Protection' - latif


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
mcafee data protection

McAfee Data Protection

Total Protection Suite for Data (ToPS Data)

mcafee data loss prevention

Data Loss Prevention

Device

Control

Endpoint

Encryption

Encrypted USB

Printer

Print Screen

USB Copy

Monitor Usage

McAfee Data Loss Prevention

You need

  • To prevent users from accidentally or maliciously leaking sensitive data
  • Full visibility and control over usage & movement of confidential data
  • To enable your infrastructure and data to protect itself

McAfee offers

  • Protection against accidental leakage via everyday user tasks
  • Complete spectrum of actionable responses upon detecting loss of confidential data such as
    • Detailed logging & forensic evidence gathering
    • Real-time prevention & blocking
    • User and administrator notification
    • Quarantine of confidential data
mcafee data loss prevention1

Classify confidential data

Build content-based, reaction rules

Monitor sensitive data transfer

By location

Prevent confidential data from leaving the enterprise

By content

Notify administrator and end users

By file-type

Quarantine confidential data

Enforce encryption

McAfee Data Loss Prevention
mcafee device control

Data Loss Prevention

Device

Control

Endpoint

Encryption

Encrypted USB

®

FireWire

McAfee Device Control

You need

  • To monitor and allow only authorized devices to connect to endpoint
  • Restriction and blocking capabilities of the use of unauthorized devices such as iPods
  • Enforcement control over what data can be copied onto authorized devices

McAfee offers

  • Fine-grained control of data and devices
    • Only allow company-authorized devices
    • Enforce control over what data can be copied to devices
  • Policies per user, group or department, i.e. allow CEO to connect any device while other employees can only connect sub-set of devices
  • Detailed user and device-level logging for auditing and compliance needs
mcafee device control1

ePO Management Console

Device and Data Events

Policies

Serial/Parallel

Other

CD/DVD

WI/IRDA

FireWire

Bluetooth

USB

McAfee Device Control
  • Based on McAfee Data Loss Prevention (DLP) technology
  • Complete content-aware, and context-aware device-blocking capability
  • Regulate how users copy data to external devices
  • Increase productivity and the ability to safely use any USB devices as part of daily work activities
  • Ensure control of all external devices
mcafee endpoint encryption eepcv 6 x

Data Loss Prevention

Device

Control

Endpoint

Encryption

Encrypted USB

McAfee Endpoint Encryption EEPCv.6.X

You need

  • Encryption for laptops, desktops, and mobile devices with the flexibility to choose full-disk or file/folder encryption
  • Confidence in integrity of sensitive data when a device is lost or stolen
  • Safe Harbor protection (i.e. Loss of encrypted data = non-event and does not require public disclosure)

McAfee offers

  • Broad support for laptops, desktops, and mobile devices
  • Full audit-trails for compliance & auditing needs
  • Support for multiple strong authentication methods
  • Certifications: FIPS 140-2, Common Criteria Level 4 (highest level for software products), BITS, CSIA, etc.
mcafee endpoint encryption file and folder encryption

Corporate Directory

Administrator

Client Computer

Client Computer

Client Computer

File Server

Terminal Server

McAfee Endpoint EncryptionFile and Folder Encryption
  • Full Windows Explorer integration
  • Automatic encryption and decryption with no performance loss, transparent enforcement of information security policies to end-users
    • No end-user managed data security
  • Protect files and folders on desktops, laptops, and servers
  • A minimum of user interaction
  • Effortless strong encryption of sensitive information
  • No security at the end-users’ own discretion
  • Easy sharing of encrypted documents among authorized users

1

2

3

4

5

file folder encryption features
File & Folder Encryption Features
  • Policy controlled, user transparent encryption of:
    • Local documents and folders
    • File server documents and folders
    • Removable media
    • Encrypted e-mail attachments (user initiated)
      • Internal (Recipients with client)
      • External (Recipients without client)
  • True on-the-fly encryption & decryption when accessing and saving protected documents
  • Flexible policy assignments and management
    • Encryption keys and encryption settings managed from McAfee Encryption Manager
    • Amount of end-user options subject to policy control
    • Policies cannot be circumvented by end-users
key differentiators summary
Key Differentiators - Summary
  • Persistent Encryption
    • Encryption “travels” with the document
  • Central Management
    • No user decisions. Policy enforcement
  • All action on client side
    • No software or payload on file servers
  • Management Centre
    • One powerful admin console for all products
  • Encrypt at all levels
    • Individual files or entire folders, or both
  • Document location and/or type
    • Encryption based on location and/or file type
  • Sharing of encrypted documents
    • Transparent sharing between auth. users
  • Client side activity monitor
    • Allow the user to see how a policy is enforced
  • Automatic pagefile encryption
    • No information leakage in virtual memory
  • One client for multiple purposes
    • One-stop-shopping for file encryption
mcafee endpoint encryption mobile device encryption
McAfee Endpoint EncryptionMobile Device Encryption

Removable Media

  • External/Removable Media EncryptionEnsures that data stored on removable cards can only be accessed from the device from which it came
  • Removable Media Options
    • Allow encrypted media only
    • Allow full access to encrypted media and read-only access to un-encrypted media
    • Block all access to all media
    • Deny access to un-encrypted cards
what is mcafee endpoint encryption for pc v 6

.APPS

Files/APPS

1

.DOC

.XLS

Operating System

2

Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet

Encryption Driver

3

#$$%%#%%&&

#$$%%#%%&&

Hard Disk

4

What is McAfee Endpoint Encryption for PC v.6?
  • Full Disk Encryption (FDE)
  • Software to encrypt every sector of internal hard disks
  • Guarantees data is encrypted while at rest on the disk
  • This assurance is used to claim safe harbor from most data protection regulations

Average cost of a lost laptop is $49,246. If you can prove it was encrypted, the cost is reduced by at least $20,000.

Average cost of a single lost record is $204.

Average total cost of a data breach in 2009 was $6.75 million.

Source: 2009 Ponemon Institute “Cost of a Data Breach Report” commissioned by Intel.

proactive reporting in epo the difference
Proactive Reporting in ePO – The Difference

Prior to ePO, SafeBoot reporting was limited to SafeBoot installed machines – no information about the machines which are NOT secured

  • Reactive Reporting: check protection status of a laptop post theft; if machine not listed in the report it means not secured
  • NEW integrated ePO reporting of Endpoint Encryption reports on the entire ePO managed machine network
    • Proactive Reporting: embedded Endpoint Encryption reporting through ePO presents machines which are not protected with Endpoint Encryption. ePO can then deploy the client to these machines directly.
proactive reporting in epo discovery
Proactive Reporting in ePO – Discovery
  • Compliance reporting with other vendors is limited to installed machine or an application running on the machine itself
  • With the proactive ePO reporting approach McAfee can go one step further and find non-secured machines, although no agent is running on the machine
  • Use the built-in “ePO Rogue System detection” option to determine the machines in your organization not running the McAfee Agent (MA)
default dashboard for endpoint encryption for pc
Default Dashboard for Endpoint Encryptionfor PC

Installation Status Report Endpoint Encryption Installed: Yes/No?

This report shows the encryption technology installed with Endpoint Encryption

new endpoint encryption architecture in epo

Anti-Virus

Anti-Spyware

Desktop FW

Host IPS

NAC

Host Compliance

Remediation

Endpoint Encryption for PC

Endpoint Encryption for Files and Folder

Host DLP

Active Directory

&

LDAP

New Endpoint Encryption Architecture in ePO

ePO provides central policies, key management and central user provisioning for Endpoint Encryption products.

One Client Manager (MA – McAfee Agent) handling multiple Endpoint Security products.

ePO Agent (MA) Framework

McAfee ePO v4.5

Secure Communication Channel

User and Machine Import

epo integration goals
ePO Integration Goals
  • Objective reduce overall operational costs associated with an encryption product and to make an Administrator’s life easier
    • Deployment
    • Reporting
    • Same tasks and policies regardless of operating system or software/hardware encryption technology
  • Improved support for
    • Clustering
    • Scalability
    • Virtualization
endpoint encryption policy in catalog
Endpoint Encryption Policy in Catalog

The new Endpoint Encryption Common Policy has two categories (Product Settings, User Based Policies)

logon settings per platform
Logon Settings per Platform

Endpoint Encryption Logon Section with settings for the PreBoot Logon

Windows specific Logon Section

why mcafee
Why McAfee?
  • Sustained product leadership
  • #1 choice for enterprises
  • Over 8,000,000 nodes encrypted worldwide
  • Mature product, original code launched in 1992
  • Part of comprehensive data protection product suite
  • McAfee Total Protection for Data suite won over Gartner with best-in-class execution, integration and vision as compared to other vendors in the data protection industry.
why mcafee1

Encrypt laptops

Block unauthorized devices

Monitor and secure all data routes

Discover and Classify Data

Intelligent Audit and Forensics

Why McAfee?

Phased approach to data protection

users in version 6 0
Users in version 6.0
  • Users are referenced not created
    • Referenced from Active Directory or LDAP
    • No local users
    • Quicker provisioning times possible
    • Can be used with Auto-Discovery of users functionality
  • ePO support
    • 4.5: Active Directory only
    • 4.5 Patch 2: Will include LDAP support
encryption settings
Encryption Settings

Encryption Policy to encrypt:

- None

- All

- Boot Disk only

- All except Boot Disk

TCG Opal Drive

EEPC Software Encryption

Policy to define Encryption Provider Priority. If you want to manage various hardware technologies via ePO you can configure and order the preferred provider here.

trusted computing group opal self encrypting drives
Trusted Computing Group Opal Self Encrypting Drives
  • McAfee are an active contributor and voting member of the TCG Storage Working Group and provide input to the Opal and Marble specifications
  • EEPC Version 6.x products will support Self-Encrypting Drives that adhere to the Opal (and Marble) specifications from TCG
  • McAfee is currently working in conjunction with various manufacturers on incorporating their Opal Drives into EEPC V6.x
client supported platforms and languages
Client Supported Platforms and Languages
  • Management (ePO)
    • Japanese, French, Spanish, Chinese (Traditional and Simplified), Russian, German, Korean.
    • Fully localized and supported
  • Client
    • Same languages and support as Management section
    • Additional client languages fully localized and available by NOT supported at GA date
    • Portuguese, Brazilian Portuguese, Italian, Dutch, Greek, Swedish, Norwegian, Danish, Finnish, Polish, Arabic, Estonian and Thai
    • Supported as of version 6.0.1

32-Bit Only

32 and 64-Bit

32-Bit Only

32 and 64-Bit

32 and 64-Bit

mcafee encrypted usb
McAfee Encrypted USB

Deploy easily on an enterprise-wide scale

Easily deploy and track devices through a single console

Streamline workflow to save time and money

Leverage Active Directory to match users and devices

Encrypt data on-the-fly

Enable secure data portability