4. .
Intel Security Confidential
4
Impacting Company Bottom Line
Costly fines Loss of customers
and revenue
Damaged
reputation
$3.79M is the average cost
of a data breach1
5. .
Intel Security Confidential
5
Understanding Data Exfiltration
Who wants the data?
Breaches are initiated by:
How are thieves
getting data out?
Where is data being
taken from?
57%
43%External
actors Internal
actors
2/3
of breaches occur on
traditional networks
1/3
occur in cloud
infrastructures
60%
Electronic
means
40%
Physical
means
6. .
Intel Security Confidential
6
Top Data Protection Challenges
Rising success rate of
malware intrusions
Keeping up with
regulatory compliance
Lack of visibility and
control of data
Both a technical problem and a
business problem to overcome
8. .
Intel Security Confidential
8
Comprehensive Portfolio
Extensive, effective, and integrated
Cloud
DLP
File
Encryption
Device
Control
Disk
Encryption
Common
Policy,
Console
and Keys
9. .
Intel Security Confidential
9
Breath Of Components
Data-in-Motion
Data-at-Rest
Data-in-Use
Data Types Data Loss Vectors Solution
DLP Prevent
DLP Monitor
DLP Discover
Drive Encryption
DLP Endpoint
File and removable
Media Encryption
Device Control
Email/IM Web Post Network Traffic Cloud
Desktop/LaptopDatabase
Removable/Devices Cloud AppsEmail/IM
File Share
File & Clipboard
Cloud Storage
101101100110101001
011001101010011011
1011011001101001
10. .
Intel Security Confidential
10
Gartner Magic Quadrant for Enterprise
Data Loss Prevention (DLP)
7 Consecutive Years as a Leader
Gartner Magic Quadrant for Mobile Data
Protection (Encryption)
8 Consecutive Years as a Leader
Award Winning Technology
11. .
Intel Security Confidential
11
Proactive Data Protection
McAfee Threat
Intelligence
Exchange Server
McAfee Data Loss
Prevention
Endpoint
Data
Exchange
Layer
DLPE Identifies
new process
(ProcessA.exe)
starts running
1 DLPE post TIE
request for
ProcessA.exe
reputation
2 TIE performs
reputation
lookup for
ProcessA.exe
3 TIE post reply:
ProcessA.exe
Most Likely
Malicious
4 5 DLPE start
monitoring
ProcessA.exe for
Any/Sensitive file
access
13. .
Intel Security Confidential
13
Achieve Compliance Effortlessly
Flexible, reusable rule sets reduce time, effort and cost
North America
Policies
Europe
Policies
John Moved from US to Germany
PCI
ePO with built-in
DLP policies
Europe
Policies
Marketing
ruleset
HR
ruleset
15. .
Intel Security Confidential
15
[McAfee DLP provides]
bite-sized education
opportunities …
DLP has an enormous
impact on the business
and security culture …
Global print/digital media company
The biggest benefit
[of McAfee DLP Endpoint]
is raising awareness when
the notification pops up …
US-based chemical company
Customer Validation
Real-time feedback via educational popups
17. .
Intel Security Confidential
17
Safe Harbor
Full Disk Encryption Locks Down Lost Data
McAfee
ePO
“FileVault”“BitLocker” “McAfee Drive
Encryption”
Audit physical thefts to avoid
fines and public disclosure
requirements
22. .
Intel Security Confidential
22
Guidance from Data Protection Professionals
• Define success metrics
• Addresses People, Process, and
Technology components
• Integrate with existing infrastructure
• Achieve security and risk management
program data collection and analysis
objectives
• Create effective information protection
policies, without months of trial and error
Compliance
Governance
Classification
Remediation
Awareness
Discovery
Policies
Risk
Assessment
Data
Protection
23. .
Intel Security Confidential
23
Finance/Banking
Merrill Lynch
Bank of the West
Kleberg First National Bank
Davidson Bank
Royal Bank of Canada
Federal (GHE)
Apollo Group
Texas Tech University – Health
Science Center (TTUHSC)
NASA
Indian Army
FAA (Federal Aviation Administration)
Manufacturing/
Pharmaceutical
Bayer
General Motors
Kimberly-Clark
Actavis
3M
Healthcare
Kaiser Permanente
Boston Scientific
Health Net
Presence Health
Children’s Hospital of
Philadelphia
Retail
Wal-Mart
Rooms To Go
Tractor Supply
Freeman Decorating Co.
Tricot
High Tech
Oracle
Telstra
DocuSign
Juniper Networks
Applied Materials
Customer Success
24. .
Intel Security Confidential
24
Intel Security Can Help!
Stop data breaches and avoid being the next data breach headline
Achieve and/or show proof of regulatory compliance
Gain visibility and central control of sensitive data on different
devices and locations, including the cloud
Engage professional services to help you with data protection
strategy
25. .
Intel Security Confidential
25
Next Step
Schedule a POC with local data protection specialists
Ask about these Jumpstart packages
Essential Services for
McAfee Host Data Loss
Prevention
Essential Services for
McAfee Network Data
Loss Prevention
Essential Services for
McAfee Endpoint
Encryption for PCs
26.
27. .
Intel Security Confidential
27
TDL
Comprehensive and Integrated SuitesCDA
CDB
Endpoint
Assistant App
ePO Deep
Command
File & Removable
Media Protection
Management of
Native Encryption
Drive Encryption
DLP Endpoint &
Device Control
CDE
DLP Prevent
DLP Monitor
DLP Discover
DLP Endpoint &
Device Control