McAfee Database Activity Monitoring automatically finds databases on your network, protects them with a set of preconfigured defenses, and helps you build a custom security policy for your environment — making it easier to demonstrate compliance to auditors and improve critical asset data protection. Database Activity Monitoring cost-effectively protects your data from all threats by monitoring activity locally on each database server and by alerting or terminating malicious behavior in real time, even when running in virtualized or cloud computing environments.
Comprehensive threat protection — Protect even your unpatched databases against zero-day attacks by blocking attacks that exploit known vulnerabilities and terminating sessions that violate your security policies.
Detailed audit trail reports — Audit trail reports are available to meet SOX, PCI, and other compliance audit requirements. During post-incident forensic analysis, this audit trail can help you understand the amount of lost data and gain greater insight into malicious activity.
Streamlined patching with no required downtime — Applying missing patches and fixing misconfigurations found by the Database Activity Monitoring vulnerability scan will improve the security posture of your databases immediately — without requiring any downtime via McAfee’s virtual patching technology.
ePolicy Orchestrator (ePO) integration — McAfee Database Activity Monitor can be directly managed with the ePO platform, providing centralized reporting and summary information for thousands of databases in a single, consistent dashboard.
Demonstrate compliance and minimize the likelihood of a breach by monitoring threats to databases from all sources, including network/application users, local privileged accounts, and sophisticated attacks from within the database itself.
Simplify the process of building custom security policies to audit and protect databases with preconfigured rules and templates.
Stop breaches by terminating suspicious sessions and quarantining malicious users with real-time monitoring and intrusion prevention for Oracle, Microsoft SQL Server, and Sybase databases.
Install sensors on physical servers, provision sensors along with the database on virtual machines, and deploy sensors remotely on cloud servers.
Find databases by scanning the network or by importing them from existing tools, and then group them by vendor, version, or custom tags (for example, HR, finance, or QA).
Receive more than 380 predefined rules that address specific issues patched by the database vendors, as well as generic attack profiles.
Use a simple, step-by-step interface for building customized security policies for PCI DSS, SOX, HIPAA, GLBA, and SAS-70, as well as best practices based on experience at hundreds of customer sites.
Evaluate process memory to determine execution plan and affected objects, identifying policy violation even from local users or obfuscated code.
Bring enterprise-level database security to the MySQL open-source database management system and collect full audit-trail information from the database.
McAfee Database Activity Monitoring integrates with the McAfee ePO software to provide a single pane, unified management platform for database security and other solutions.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Use a single solution and achieve continuous compliance with McAfee Configuration Control.
Learn how the McAfee Database Security Solution protects you from database breaches and falling victim to cybercrime. This solution includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring, and McAfee ePolicy Orchestrator software.
The state of Alaska utilizes McAfee's product portfolio to protect data centers and networks across 16 state agencies, saving $3.8 million.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work together to provide enterprises with automated, adaptive threats response, which reduces time-to-containment of malicious files. The moment a file is convicted, the entire security infrastructure is informed and updated immediately, providing greatly enhanced visibility and control, from endpoint to network.
McAfee has a simple, proven approach to securing EOL databases that combines two best-in-class technologies recognized by compliance officers as valid compensating control for legacy database platforms.
McAfee Database Security offers real-time protection for business-critical databases from all types of threats: external, internal, and even intra-database exploits.
Learn about the top five reasons why you should deploy a dedicated McAfee Database Security solution.
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
This document contains recommendations from McAfee for creating custom rules and rule objects. It should serve both as a starting point for the implementation of McAfee Database Activity Monitoring and as an example of the ease of rule creation and management.
Learn about the technology challenges when protecting databases in virtualized environments.
McAfee Database Security Solution is the ultimate, multitiered software solution that can protect all databases and data assets — helping you ward off threats and eliminate vulnerabilities.
McAfee Configuration Control eliminates manual processes and point product integration, providing single-console control for meeting compliance requirements.
By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]
BYOD, BYOA, BYOx. The IT industry is full of acronyms depicting its constant evolution and relationship with the professional world. First came the devices; employees saw the power of personal devices and insisted on using them in the workplace. And so the consumerisation of IT was born. After the devices came the apps. Companies reported […]
There’s been a lot of talk about the value of public-private partnerships in moving the U.S. toward a more robust cyber security posture. And let’s be honest: there’s also been a lot of private sector skepticism about how much the Administration really believed in the concept or how much they would do to make it […]
McAfee is based in Silicon Valley, but we know there’s more to tech than California. We recently joined the National Institute of Standards and Technology to launch the National Cybersecurity Center of Excellence, a joint effort among high-tech business, federal, state and local government and local universities located in Rockville, Md. The goal of the […]
The post Five Factors That Make D.C. Region a Cybersecurity Hub appeared first on McAfee.
Nothing is as frustrating as when something goes wrong, especially when you have time constraints. NIST has just released Special Publication 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations where a few notable items have been added to increase the confidence that security, practices, procedures and architectures of information systems […]