McAfee Enterprise Log Manager automates log management and analysis for all log types, including Windows Event logs, Database logs, Application logs, and Syslogs. Logs are signed and validated, ensuring authenticity and integrity — a necessity for regulatory compliance. Out-of-the-box compliance rule sets and reports make it simple to prove your organization is in compliance and policies are being enforced.
Using this tightly integrated log collection, management, and analysis environment will both strengthen your security profile and dramatically improve your ability to comply with over 240 standards, such as PCI DSS, HIPAA/HITECH, NERC-CIP, FISMA, GLBA, and SOX.
Intelligent log management — Enterprise Log Manager collects logs intelligently, storing the right logs for compliance, and parsing and analyzing those logs for security. You can retain logs in their original format for as long as you require for specific compliance needs. Since we do not alter the original log files, McAfee supports chain of custody and non-repudiation efforts.
Integrated with Enterprise Security Manager — Enterprise Log Manager is an optional, integrated part of McAfee Enterprise Security Manager. While Enterprise Log Manager stores the logs, they can be deeply parsed, normalized, and analyzed by Enterprise Security Manager. Log information is immediately available for real-time security investigations and incident response.
Collect, sign, and store any log type in its original format for as long as you require to support your specific compliance needs.
Use easily customizable storage pools to ensure that your logs are stored correctly and for the right amount of time.
Differentiate logs stored for compliance from logs to be parsed and analyzed for security.
Choose the best storage option for your needs — with up to 7.5 TB of usable HDD storage on the appliances, and optional fiber channel cards for high-speed SAN storage.
Get one-click access to original log files and even the specific log record from any point in the event management process.
Provide log management and retention capabilities to support advanced use cases, including:
|Collection Rates||75,000 events per second||50,000 events per second||40,000 events per second|
|Analytical Performance||14 TB||8 TB||3 TB|
Built for big security data, McAfee Global Threat Intelligence for McAfee Enterprise Security Manager (ESM) puts the power of McAfee Labs directly into the security monitoring flow using McAfee’s high-speed, highly intelligent security information and event management (SIEM) solution.
The security information and event management (SIEM) market is defined by the customer's need to analyze security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for regulatory compliance and forensics. The vendors that are included in Gartner’s analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.
McAfee integrates NitroSecurity products into its portfolio, improving its SIEM offering.
Topics : SIEM
McAfee spoke with customers about integrating SIEM with Threat Intelligence and how it helped their effort to mitigate bad actors.
Learn about the top five issues with SIEM: Big Security Data, Content and User Awareness, Dynamic Context, Solution Customization, and Business Value.
For a technical summary on the McAfee product listed above, please view the product data sheet.
For a technical summary on the McAfee product listed above, please view the product data sheet.
How Intelligent and scalable SIEM solutions help IT security professionals stay on top of an ever-evolving, data-driven environment. A report from McAfee and CIO.
This report takes a candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.
This Pike Pulse report presents an analysis of the current governance, risk management, and compliance (GRC) vendors that are believed to be the best positioned for the future. McAfee scores the highest in assessment of GRC vendors for smart grid security.
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
Learn how McAfee IT uses the McAfee SIEM with other McAfee products to provide the highest level of visibility and situational awareness to protect critical information and infrastructure, achieve PCI compliance, and leverage virtual machines in the McAfee security infrastructure.
When there are indications that an attack may have occurred, security analysts require immediate visibility into the state of systems. McAfee Enterprise Security Manager seamlessly integrates with McAfee Real Time to gather system state continuously, introducing unprecedented situational awareness.
Deployment of McAfee Enterprise Security Manager and Enterprise Log Manager addresses the need for secure log collection, transport, handling, and storage, permitting your organization to prove non-repudiation and chain of custody of log records. Adding in McAfee Integrity Control ensures that the native log files being generated are a true and accurate record, preventing malicious users from interfering with the log generation process.
The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Read SANS review of McAfee’s Enterprise Security Manager (ESM) 9.2 with a focus on fundamental SIEM features and capabilities to meet the demand for security and threat intelligence.
McAfee EDB data management technology handles all of these SIEM/logging requirements. It is designed, implemented, maintained, and tested by our world-class in-house development team to meet the demanding requirements of SIEM/logging and leverage all of the capabilities of appropriate emerging technologies such as modern operating systems, multicore CPUs, solid state and RAM drives, and large amounts of main memory.
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.
This white paper examines cyber security issues for industrial control systems with a specific focus on security event monitoring as it applies to industrial control networks such as SCADA.
Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.
In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support of an organization’s applicable and prospective security and compliance programs and initiatives.
In this paper, we explore the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Welcome to the third Microsoft Patch Tuesday of 2014. As the snow slowly starts melting in the Northern Hemisphere, we come to our second to last update for Windows XP. This month, all five bulletins affect Windows XP. For those of you that still have Windows XP systems in your environment, I highly recommend you […]
It’s all becoming so nefarious. Today, we live, work, and play in a world that is riddled with bad guys going to great lengths to undermine the fabric of society through cybercrime. Thankfully, there are also teams of incredible people with amazing minds analyzing, researching, and protecting businesses and consumers from the looming damage. Just […]
The post Network Security Perspective: Point-of-Sale, Data Loss, and the Black Market appeared first on McAfee.
This year’s RSA Conference was a major success for McAfee, garnering significant excitement because our McAfee Threat Intelligence Exchange announcement. In fact one industry analyst told me, “every client I have met has asked about your announcement.” Being the old dog in the market with over 25 years of experience researching and providing endpoint protection solutions positions […]
The post Threat Intelligence Exchange: An Old Dog with Plenty of New Tricks appeared first on McAfee.
This week, President Obama released his annual draft budget for Fiscal Year 2015. The budget calls for reductions in defense, leaving the physical U.S. military at is smallest level since WWII. At the same time, spending levels for cybersecurity could be increasing – or at least they won’t be declining. This reflects a strategic realignment […]
The post Cybersecurity Emphasized in the President’s Budget appeared first on McAfee.
Target. Neiman Marcus. These are just two of the very latest victims of today’s increasingly stealthy threats permeating our cyber world. My post last month entitled, Stolen Data: Network Security Can Ensure You’re Not a Target, described the attacks that attempted to exfiltrate data from 110 million American consumers. Advanced persistent threats (APTs) were responsible […]
The post Information Week Report Exposes the Risks but Confirms the Strategy appeared first on McAfee.