Site Search

Trellix

Trellix

Data Loss Prevention

Trellix Data Loss Prevention(DLP)

⇒A product line that prevents data leaks by identifying and protecting data on the network and offline

Features of Trellix Data Security

Features of Trellix Data Security

DLP Endpoint: Device protection
  • Windows/MacOS
  • Data Protection Features
  • Device Protection
DLP Prevent/Monitor
  • Mail Data Protection
  • Web Data Protection
  • Packet Capture
DLP Discover: Server Protection
  • NAS/BOX file data protection
  • SharePoint Data Protection
  • DB Record Protection
Skyhigh CASB/SSE: Cloud Protection
  • File protection in cloud environments
  • Cloud Service Data Protection
  • Cloud Access Control
Click here for details

Trellix Data Security Lineup

Line of Business Product Type Product Family Products
Data Security
Data Protection
Data Loss Prevention
Information leakage prevention measures
Data Loss Prevention Endpoint
Endpoint Data Leak Prevention
①Data Loss Prevention Endpoint Complete:
DLP Full Version
②Device Control:
DLP Device Control Limited Edition
Data Loss Prevention Network
Network information leakage prevention
③Data Loss Prevention Network Prevent:
Web/email information leakage prevention
④Data Loss Prevention Network Monitor:
Network Information Leakage Monitoring
Data Loss Prevention Discover
Data Discovery
⑤Data Loss Prevention Discover:
Detection of confidential information stored on servers, etc.
Data Encryption
Data Encryption
Drive Protection
HDD encryption
⑥ Drive Encryption:
Trellix proprietary HDD encryption management
⑦Native Drive Encryption:
OS standard encryption management
File Protection
File Encryption
⑧File and Removable media Protection:
File or removable media encryption

①Data Loss Prevention Endpoint Complete DLP complete version

<概要>

  • Endpoint Data Leak Prevention
  • Block information leakage from various routes
    • route
      - Email
      - Removable media
      -printing
      - Webmail/Bulletin board
      - Screen capture
      - Clipboard etc.
    • action
      - Logging
      -block
      - Alert
      - Preservation of evidence
  • Automatic identification of data files
    • Automatically identifies the type of data file (confidential information) based on policies, and sets rules for each identified file type and for each data transfer outflow route, ensuring that important information is not leaked to the outside.

②Device Control DLP Device Control Limited Edition

<概要>

  • Restrict available external devices (printers, USB, etc.) and regulate how confidential information can be copied

<Device control example>

  • Only specified USB memory devices are allowed to read and write, and appropriate controls (read-only or connection refusal) are implemented for other devices.
    • "Permission (read and write)": USB provided by the company, devices necessary for work, etc.
    • "Restricted (Read-only)": Media such as CD/DVD, etc.
    • "Prohibited (Connection Denied)": Other devices not required for work, etc.

<Device designation>

  • Devices can be flexibly specified using parameters such as product ID, vendor ID, and USB serial number (individual)

<File-by-file control>

  • Restrict export of files containing specified keywords
  • Logging of individual files written to removable media

<Points>

  • Prevents data transmission or copying to external devices, preventing confidential information from leaking
  • Obtain operation logs for devices and record information removal

③Data Loss Prevention Network Prevent Web/email information leakage countermeasures

<概要>

  • Integration with Proxy Server (ICAP)
    • Inspect web traffic
    • Returns the inspection result to the web proxy server to allow or deny the traffic to the destination server.
  • Integration with mail server (SMTP)
    • Scan your email
    • Based on the results of the inspection, the sending of the email is blocked or information is added to the header and sent to the sending email server.

④Data Loss Prevention Network Monitor Network information leakage monitoring

<概要>

  • Monitors communications defined by protection rules (web transmissions, email, network).
  • Communications are not blocked or altered, so there is no impact on communications
  • If you discover a violation, create a hold and incident

<Points>

  • EDM (Exact Data Matching) available
  • Real-time scanning blocking

⑤Data Loss Prevention Discover Detects confidential information stored on servers, etc.

<概要>

  • Discover sensitive information in your repositories
    • File Server (CIFS)
    • Share Point
    • Box
    • Databases (Microsoft SQL, MySQL, DB2, Oracle)
    • Such

<Specifications>

  • Inventory Scan:
    • Collect metadata from files in the target repository and verify the stored files
  • Classification Scan
    • Discovering Sensitive Information in Repositories
  • Remediation Scan
    • Encrypting sensitive files or moving them to a secure repository
  • Registration Scan
    • Detect documents containing sensitive information and create fingerprint signatures

⑥Drive Encryption Trellix proprietary HDD encryption management

<概要>

Uses pre-boot authentication and a powerful encryption engine to protect data from unauthorized access, loss, or disclosure

<Points>

① Automatically encrypt all data on the hard disk

All temporary files and backup files in the system area are encrypted, ensuring strong security at all times.

Drive Encryption Trellix 独自 HDD暗号管理

②Strong user authentication and easy operability

  • Unique user authentication is performed before the OS starts (authentication settings for when the screen saver is restored are also possible)
  • Once authentication is passed, data encryption/decryption is automatically processed in the background, allowing you to use your computer without having to worry about any special operations.

⑦Native Drive Encryption OS standard encryption management

<概要>

Supports management of OS standard encryption (Windows: BitLocker, Mac: File Vault)

⑧File and Removable media Protection (FRP)

<概要>

  • Encryption is performed on internal files to minimize damage caused by file leaks.
  • Automatic encryption when writing to removable media (USB memory, external HDD)
  • Encryption when saving data to a specified network folder

<Points>

  • Encrypted files can only be decrypted under the following conditions:
    • Machines with FRP installed
    • The user or machine that was granted the decryption key
  • Automatic data encryption reliably prevents information leaks when removable media is stolen or lost.
  • Reduces the risk of exposure even if information is leaked
File and Removable media Protection(FRP)ファイルまたはリムーバブルメディア暗号

Trellix ePolicy Orchestrator(ePO)

  • A platform for integrated management of former McAfee security products
  • By centrally managing Trellix (formerly McAfee) products such as antivirus, host IPS, and Device Control, you can install software, distribute policies, collect logs, and more.

<ePO Features>

  • Manage multiple functions from a single console
    • Forced installation on non-installed computers
    • Distributing security policies to client computers
    • Understanding the security status of client computers
  • Centralized management of logs and creation of various reports
    • Display various product reports graphically on the dashboard
  • easy management
    • Web-based console allows access using a browser

<Products that can be managed/integrated with ePO>

  • Trellix Drive Encryption
  • Trellix Device Control
  • Trellix File and Removable media Protection
  • Trellix Data Loss Prevention Endpoint

Inquiry/Document request

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Weekdays: 9:00-17:00