There are two main reasons for the need to protect confidential data: the legislation on the protection of privacy and the protection of intellectual property against external infringements and insider threats. Currently, 58% of the countries in the world have legislation that is becoming increasingly burdensome over time. Insider trading violations and data theft are a common topic in the media, as there are always high-profile issues affecting the brand. Violations are costly in terms of fines, lost revenue and collection costs.
In the past, data protection was implemented via DLP at the endpoint and corporate network level. Both approaches have their strengths and weaknesses: A network DLP is unable to control the movement of sensitive data to USB drives and the DLP endpoint does not have some of the more complex DLP functions that require more memory and processing power. Many customers have used both DLP solutions for their business.
Other vendors who do not have DLP for business offerings have added DLP-lite functionality to their products, mainly email security and web security products, and some companies have chosen DLP for business solutions.
This approach was sustainable until the cloud became widely available. Ninety-five percent of companies have implemented or are implementing cloud computing services, and 79 percent of them allow the storage of sensitive data. Data is everywhere these days: on laptops, servers, in authorized applications, in unauthorized parallel computing applications, and when moving from one cloud to another. Data protection within the four walls of an organisation is no longer sufficient.
Companies, especially those with a cloud first strategy, have responded to this challenge by implementing a CASB solution such as the McAfee MVISION Cloud. Depending on the product, this can solve some or all of the cloud implementation issues – MVISION Cloud solves them all.
However, the problem is that some companies live with gaps in protection because they do not use many products. A DLP endpoint cannot provide a solution for a cloud, just as a DLP cloud cannot provide a solution for an endpoint and a web DLP can provide an effective solution for authorized applications that enable online interactions or for endpoints. If you consider the common applications with the possible leak vectors of the DLP, you will understand why one product is not a complete solution:
To solve this problem, companies are in the process of implementing various products. It fills all the gaps, but it also has weaknesses. Many products cost expensive licenses, have higher IT management overhead and are more complex to implement due to their fine-grained implementation. These differences are due to differences in DLP policies, data classification and content extraction mechanisms. This makes it difficult to ensure consistent recognition of all products because the data classification, which has been refined over time, has to be entered from scratch with each new product, resulting in reduced efficiency.
McAfee Unified Cloud Edge (UCE) solves these problems. An ECU is a combination of DLP, SaaS web proxy and CASB terminals that covers all potential data leak vectors: Access points, unauthorized parallel computing applications, authorized applications (including email) and data transfer from the cloud to the cloud. The ECU is managed from a single console and uses the same DLP technology everywhere, such as B. Policy and content retrieval mechanisms to achieve maximum efficiency with consistent results. Organizations can maintain their investment in a carefully designed data classification, allowing all vectors to be used and easily extended to the cloud. The ECU is a highly scalable, cloud-based solution with the best uptime and availability in the industry.
Would you like to know more? Then go to https://www.mcafee.com/enterprise/en-us/solutions/unified-cloud-edge.html.
x3Cimg height=1 width=1 style=display:no src=https://www.facebook.com/tr?id=766537420057144&ev=PageView&noscript=1 />x3C/noscript>’) ;unified cloud edge mcafee,azure cloud security,azure data security architecture,azure security tutorial,azure cloud security principles,cloud security document,data security in azure