SlideShare a Scribd company logo
1 of 12
CLIENT NAME
McAfee An Intel Company
Network Data Loss Prevention Presentation
Jerry Paul Acosta
Systems Engineer – PSG
Trends & Technologies-Vismin
NDLP Intro Purpose
Potential
Market
McAfee an INTEL Company
NDLP
Deployment
Installation
Procedures
www.trends.com.ph
McAfee
Company
•McAfee is the world’s largest dedicated security technology company.
• It markets software and services to home users, businesses and the public sector
•Microprocessor company Intel agreed to purchase McAfee for $7.68 billion (£5 billion).
•The acquisition closed on February 28, 2011.
•McAfee is equipped with Global Threat Intelligence (GTI)
•GTI is unique only for McAfee and has a predictive capability
•GTI enables home users and businesses to stay one step ahead of online threats.
Based on the global study across 24
nations, McAfee reported that India was far
ahead of nations like US, Japan and Singapore,
when it comes to basic PC protection
Strategic
Implementation
Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
NDLP
•Safeguards intellectual property and ensures compliance by protecting sensitive data
Key benefits:
Prevent data leaks — secures all sensitive data wherever it is stored or used,
from the USB drive to the network firewall.
Stay ahead of threats — gives you visibility into how your sensitive information is being used;
enables you to automate content-aware data protection without disrupting business.
Deploy and manage with ease — deploys accurate and effective DLP polices in just days,
not weeks or months, and centrally manage it through the McAfee ePO platform.
Strategic
Implementation
Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
DLP interface
McAfee
www.trends.com.ph
NDLP
Overview
McAfee DLPE 9.2:
technical documentation
http://mysupport.mcafee.com
mcafee university:
https://rod.sumtotalsystems.com/mcafee
Data
ViolationsViolationsViolationsViolations
Data
Data Analytics
Capture
All Data
Footprint
Capture
All Data
Footprint
Company/Organization Data
Data Analytics
Capture All
Data
Footprint
Capture All
Data
Footprint
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
www.trends.com.ph
•Investors, Stakeholders, Executives want to be assured that company data is not
compromised.
•Global Companies now need to abide the Global Data Protection Laws
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
www.trends.com.ph
•Research and Development
•Technology
•Transportation
•Telecommunication
•Military
•Financial Groups
•Banks
•Insurance
•Health Care
•Hospitals
•Pharmaceuticals
nsitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-
ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens
e-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensit
sitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-s
ensitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secre
ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens
tive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-se
-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensiti
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Head Office
•R&D
•Manufacturing Branch Office
•Sales
•Service Delivery
•Outsourcing
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Secured Corporate LAN Network Egress/DMZ
MTA or Proxy
SPAN Port or Tap
Disconnected
• Network DLP Monitor
• Network DLP Prevent
• Network DLP Discover• Host DLP
• Device Control
• Endpoint Encryption
• Host DLP
• Device Control
• Endpoint Encryption
• Encrypted Media
Central Management
• ePolicy Orchestrator (ePO)
• Network DLP Manager
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Deployment
Installation
ProceduresMcAfee
www.trends.com.ph
nstallation Procedure:
Install ePO
Install NDLP(Manager)
Install NDLP Monitor, Prevent/Discover
Install DLPE Components:
- Create authorized users in ePO SQL server
- Run DLP WCF installer
Configure the ePO Server
Configure the DLP policy to gover both NDLP
and Endpoint DLP in iManager
Test and Troubleshoot
Strategic
Implementation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
Strategic
Implementation
www.trends.com.ph
Increasing DLP maturity
Monitor
Without
Blocking
Educate
End
Users
Operationalize
DLP
Control
External
Media
Discover
Sensitive
Data
Automate
Remediation
NDLP Intro Purpose
Potential
Market
Network Data Loss Prevention: NDLP
NDLP
Pre-requisites
Installation
ProceduresMcAfee
Strategic
Implementation
www.trends.com.ph
Demo Video on Data Loss Prevention
•Capture Technology
•GUI Interfaces

More Related Content

What's hot

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 

Similar to How Network Data Loss Prevention is Implemented

ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
PECB
 

Similar to How Network Data Loss Prevention is Implemented (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
GDPR 101
GDPR 101GDPR 101
GDPR 101
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt070614F-ISOAPresentation.ppt
070614F-ISOAPresentation.ppt
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 

Recently uploaded

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

How Network Data Loss Prevention is Implemented

  • 1. CLIENT NAME McAfee An Intel Company Network Data Loss Prevention Presentation Jerry Paul Acosta Systems Engineer – PSG Trends & Technologies-Vismin
  • 2. NDLP Intro Purpose Potential Market McAfee an INTEL Company NDLP Deployment Installation Procedures www.trends.com.ph McAfee Company •McAfee is the world’s largest dedicated security technology company. • It markets software and services to home users, businesses and the public sector •Microprocessor company Intel agreed to purchase McAfee for $7.68 billion (£5 billion). •The acquisition closed on February 28, 2011. •McAfee is equipped with Global Threat Intelligence (GTI) •GTI is unique only for McAfee and has a predictive capability •GTI enables home users and businesses to stay one step ahead of online threats. Based on the global study across 24 nations, McAfee reported that India was far ahead of nations like US, Japan and Singapore, when it comes to basic PC protection Strategic Implementation
  • 3. Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph NDLP •Safeguards intellectual property and ensures compliance by protecting sensitive data Key benefits: Prevent data leaks — secures all sensitive data wherever it is stored or used, from the USB drive to the network firewall. Stay ahead of threats — gives you visibility into how your sensitive information is being used; enables you to automate content-aware data protection without disrupting business. Deploy and manage with ease — deploys accurate and effective DLP polices in just days, not weeks or months, and centrally manage it through the McAfee ePO platform. Strategic Implementation
  • 4. Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment DLP interface McAfee www.trends.com.ph NDLP Overview McAfee DLPE 9.2: technical documentation http://mysupport.mcafee.com mcafee university: https://rod.sumtotalsystems.com/mcafee Data ViolationsViolationsViolationsViolations Data Data Analytics Capture All Data Footprint Capture All Data Footprint Company/Organization Data Data Analytics Capture All Data Footprint Capture All Data Footprint Strategic Implementation
  • 5. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee www.trends.com.ph •Investors, Stakeholders, Executives want to be assured that company data is not compromised. •Global Companies now need to abide the Global Data Protection Laws Strategic Implementation
  • 6. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee www.trends.com.ph •Research and Development •Technology •Transportation •Telecommunication •Military •Financial Groups •Banks •Insurance •Health Care •Hospitals •Pharmaceuticals nsitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret- ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens e-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensit sitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-s ensitive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secre ve-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sens tive-classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-se -classified-confidential-secret-top secret- sensitive-classified-confidential-secret-top secret-sensiti Strategic Implementation
  • 7. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Head Office •R&D •Manufacturing Branch Office •Sales •Service Delivery •Outsourcing Strategic Implementation
  • 8. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Secured Corporate LAN Network Egress/DMZ MTA or Proxy SPAN Port or Tap Disconnected • Network DLP Monitor • Network DLP Prevent • Network DLP Discover• Host DLP • Device Control • Endpoint Encryption • Host DLP • Device Control • Endpoint Encryption • Encrypted Media Central Management • ePolicy Orchestrator (ePO) • Network DLP Manager Strategic Implementation
  • 9. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph Strategic Implementation
  • 10. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Deployment Installation ProceduresMcAfee www.trends.com.ph nstallation Procedure: Install ePO Install NDLP(Manager) Install NDLP Monitor, Prevent/Discover Install DLPE Components: - Create authorized users in ePO SQL server - Run DLP WCF installer Configure the ePO Server Configure the DLP policy to gover both NDLP and Endpoint DLP in iManager Test and Troubleshoot Strategic Implementation
  • 11. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee Strategic Implementation www.trends.com.ph Increasing DLP maturity Monitor Without Blocking Educate End Users Operationalize DLP Control External Media Discover Sensitive Data Automate Remediation
  • 12. NDLP Intro Purpose Potential Market Network Data Loss Prevention: NDLP NDLP Pre-requisites Installation ProceduresMcAfee Strategic Implementation www.trends.com.ph Demo Video on Data Loss Prevention •Capture Technology •GUI Interfaces