gptkbp:instance_of
|
gptkb:software
|
gptkbp:bfsLayer
|
4
|
gptkbp:bfsParent
|
gptkb:Mc_Afee
|
gptkbp:can_create
|
Audit logs
|
gptkbp:character_customization
|
gptkb:battle
|
gptkbp:deployment
|
Cloud environments
On-premises systems
|
gptkbp:developed_by
|
gptkb:Mc_Afee
|
gptkbp:features
|
Content discovery
Network protection
Endpoint protection
|
https://www.w3.org/2000/01/rdf-schema#label
|
Mc Afee Data Loss Prevention
|
gptkbp:includes
|
Reporting tools
Alerting mechanisms
|
gptkbp:integrates_with
|
gptkb:Mc_Afee_e_Policy_Orchestrator
Third-party applications
|
gptkbp:is_available_in
|
Multiple languages
|
gptkbp:is_compatible_with
|
gptkb:HIPAA
gptkb:Mac_OS
gptkb:operating_system
gptkb:GDPR
PCIDSS
|
gptkbp:is_designed_for
|
IT security teams
|
gptkbp:is_evaluated_by
|
gptkb:Forrester
gptkb:Gartner
|
gptkbp:is_part_of
|
gptkb:Mc_Afee_Security_Suite
Data security strategy
|
gptkbp:is_scalable
|
gptkb:battle
|
gptkbp:is_supported_by
|
Technical support team
|
gptkbp:is_used_by
|
Enterprises
|
gptkbp:is_used_for
|
Preventing data breaches
|
gptkbp:marketed_as
|
Government agencies
Large organizations
Small businesses
|
gptkbp:monitors
|
Web traffic
File transfers
Email communications
|
gptkbp:offers
|
Data encryption
Incident response
Policy enforcement
User training
|
gptkbp:provides
|
Data protection
Real-time monitoring
User activity monitoring
Policy templates
|
gptkbp:released_in
|
gptkb:2010
|
gptkbp:supports
|
Compliance regulations
Data classification
|
gptkbp:targets
|
Sensitive data
|
gptkbp:utilizes
|
Machine learning
|