SlideShare a Scribd company logo
1 of 12
CLIENT NAME
McAfee An Intel Company
Network Data Loss Prevention Presentation
Jerry Paul Acosta
Systems Engineer – PSG
Trends & Technologies-Vismin
NDLP Intro Purpose
Potential
Market
McAfee an INTEL Company
NDLP
Deployment
Installation
Procedures
www.trends.com.ph
McAfee
Company
•McAfee is the world’s largest dedicated security technology company.
• It markets software and services to home users, businesses and the public sector
•Microprocessor company Intel agreed to purchase McAfee for $7.68 billion (£5 billion).
•The acquisition closed on February 28, 2011.
•McAfee is equipped with Global Threat Intelligence (GTI)
•GTI is unique only for McAfee and has a predictive capability
•GTI enables home users and businesses to stay one step ahead of online threats.
Based on the global study across 24
nations, McAfee reported that India was far
ahead of nations like US, Japan and Singapore,
when it comes to basic PC protection
Strategic
Implementation
Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
NDLP
•Safeguards intellectual property and ensures compliance by protecting sensitive data
Key benefits:
Prevent data leaks — secures all sensitive data wherever it is stored or used,
from the USB drive to the network firewall.
Stay ahead of threats — gives you visibility into how your sensitive information is being used;
enables you to automate content-aware data protection without disrupting business.
Deploy and manage with ease — deploys accurate and effective DLP polices in just days,
not weeks or months, and centrally manage it through the McAfee ePO platform.
Strategic
Implementation
Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
DLP interface
McAfee
www.trends.com.ph
NDLP
Overview
McAfee DLPE 9.2:
technical documentation
http://mysupport.mcafee.com
mcafee university:
https://rod.sumtotalsystems.com/mcafee
Data
ViolationsViolationsViolationsViolations
Data
Data Analytics
Capture
All Data
Footprint
Capture
All Data
Footprint
Company/Organization Data
Data Analytics
Capture All
Data
Footprint
Capture All
Data
Footprint
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
www.trends.com.ph
•Investors, Stakeholders, Executives want to be assured that company data is not
compromised.
•Global Companies now need to abide the Global Data Protection Laws
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
www.trends.com.ph
•Research and Development
•Technology
•Transportation
•Telecommunication
•Military
•Financial Groups
•Banks
•Insurance
•Health Care
•Hospitals
•Pharmaceuticals
nsitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-
ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens
e-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensit
sitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-s
ensitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secre
ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens
tive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-se
-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensiti
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Head Office
•R&D
•Manufacturing Branch Office
•Sales
•Service Delivery
•Outsourcing
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Secured Corporate LAN Network Egress/DMZ
MTA or Proxy
SPAN Port or Tap
Disconnected
• Network DLP Monitor
• Network DLP Prevent
• Network DLP Discover• Host DLP
• Device Control
• Endpoint Encryption
• Host DLP
• Device Control
• Endpoint Encryption
• Encrypted Media
Central Management
• ePolicy Orchestrator (ePO)
• Network DLP Manager
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
nstallation Procedure:
Install ePO
Install NDLP(Manager)
Install NDLP Monitor, Prevent/Discover
Install DLPE Components:
- Create authorized users in ePO SQL server
- Run DLP WCF installer
Configure the ePO Server
Configure the DLP policy to gover both NDLP
and Endpoint DLP in iManager
Test and Troubleshoot
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
Strategic
Implementation
www.trends.com.ph
Increasing DLP maturity
Monitor
Without
Blocking
Educate
End
Users
Operationalize
DLP
Control
External
Media
Discover
Sensitive
Data
Automate
Remediation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
Strategic
Implementation
www.trends.com.ph
Demo Video on Data Loss Prevention
•Capture Technology
•GUI Interfaces

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 

Similar to How Network Data Loss Prevention is Implemented

ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017paul young cpa, cga
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.pptvikramjeet57
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Outpost24
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 

Similar to How Network Data Loss Prevention is Implemented (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

How Network Data Loss Prevention is Implemented

  • 1. CLIENT NAME McAfee An Intel Company Network Data Loss Prevention Presentation Jerry Paul Acosta Systems Engineer – PSG Trends & Technologies-Vismin
  • 2. NDLP Intro Purpose Potential Market McAfee an INTEL Company NDLP Deployment Installation Procedures www.trends.com.ph McAfee Company •McAfee is the world’s largest dedicated security technology company. • It markets software and services to home users, businesses and the public sector •Microprocessor company Intel agreed to purchase McAfee for $7.68 billion (£5 billion). •The acquisition closed on February 28, 2011. •McAfee is equipped with Global Threat Intelligence (GTI) •GTI is unique only for McAfee and has a predictive capability •GTI enables home users and businesses to stay one step ahead of online threats. Based on the global study across 24 nations, McAfee reported that India was far ahead of nations like US, Japan and Singapore, when it comes to basic PC protection Strategic Implementation
  • 3. Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph NDLP •Safeguards intellectual property and ensures compliance by protecting sensitive data Key benefits: Prevent data leaks — secures all sensitive data wherever it is stored or used, from the USB drive to the network firewall. Stay ahead of threats — gives you visibility into how your sensitive information is being used; enables you to automate content-aware data protection without disrupting business. Deploy and manage with ease — deploys accurate and effective DLP polices in just days, not weeks or months, and centrally manage it through the McAfee ePO platform. Strategic Implementation
  • 4. Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment DLP interface McAfee www.trends.com.ph NDLP Overview McAfee DLPE 9.2: technical documentation http://mysupport.mcafee.com mcafee university: https://rod.sumtotalsystems.com/mcafee Data ViolationsViolationsViolationsViolations Data Data Analytics Capture All Data Footprint Capture All Data Footprint Company/Organization Data Data Analytics Capture All Data Footprint Capture All Data Footprint Strategic Implementation
  • 5. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee www.trends.com.ph •Investors, Stakeholders, Executives want to be assured that company data is not compromised. •Global Companies now need to abide the Global Data Protection Laws Strategic Implementation
  • 6. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee www.trends.com.ph •Research and Development •Technology •Transportation •Telecommunication •Military •Financial Groups •Banks •Insurance •Health Care •Hospitals •Pharmaceuticals nsitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret- ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens e-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensit sitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-s ensitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secre ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens tive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-se -classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensiti Strategic Implementation
  • 7. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Head Office •R&D •Manufacturing Branch Office •Sales •Service Delivery •Outsourcing Strategic Implementation
  • 8. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Secured Corporate LAN Network Egress/DMZ MTA or Proxy SPAN Port or Tap Disconnected • Network DLP Monitor • Network DLP Prevent • Network DLP Discover• Host DLP • Device Control • Endpoint Encryption • Host DLP • Device Control • Endpoint Encryption • Encrypted Media Central Management • ePolicy Orchestrator (ePO) • Network DLP Manager Strategic Implementation
  • 9. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Strategic Implementation
  • 10. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph nstallation Procedure: Install ePO Install NDLP(Manager) Install NDLP Monitor, Prevent/Discover Install DLPE Components: - Create authorized users in ePO SQL server - Run DLP WCF installer Configure the ePO Server Configure the DLP policy to gover both NDLP and Endpoint DLP in iManager Test and Troubleshoot Strategic Implementation
  • 11. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee Strategic Implementation www.trends.com.ph Increasing DLP maturity Monitor Without Blocking Educate End Users Operationalize DLP Control External Media Discover Sensitive Data Automate Remediation
  • 12. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee Strategic Implementation www.trends.com.ph Demo Video on Data Loss Prevention •Capture Technology •GUI Interfaces