McAfee Database Activity Monitoring

McAfee Database Activity Monitoring

Cost-effective database protection to meet your compliance requirements

Next Steps:

Overview

McAfee Database Activity Monitoring automatically finds databases on your network, protects them with a set of preconfigured defenses, and helps you build a custom security policy for your environment — making it easier to demonstrate compliance to auditors and improve critical asset data protection. Database Activity Monitoring cost-effectively protects your data from all threats by monitoring activity locally on each database server and by alerting or terminating malicious behavior in real time, even when running in virtualized or cloud computing environments.

Comprehensive threat protection — Protect even your unpatched databases against zero-day attacks by blocking attacks that exploit known vulnerabilities and terminating sessions that violate your security policies.

Detailed audit trail reports — Audit trail reports are available to meet SOX, PCI, and other compliance audit requirements. During post-incident forensic analysis, this audit trail can help you understand the amount of lost data and gain greater insight into malicious activity.

Streamlined patching with no required downtime — Applying missing patches and fixing misconfigurations found by the Database Activity Monitoring vulnerability scan will improve the security posture of your databases immediately — without requiring any downtime via McAfee’s virtual patching technology.

ePolicy Orchestrator (ePO) integration — McAfee Database Activity Monitor can be directly managed with the ePO platform, providing centralized reporting and summary information for thousands of databases in a single, consistent dashboard.

SC Magazine award winner: Best database security

Learn More

Expand visibility with MySQL free plug-in

Download Now

Features & Benefits

Get maximum protection for sensitive data, meet compliance requirements, and reduce exposure to costly breaches

Demonstrate compliance and minimize the likelihood of a breach by monitoring threats to databases from all sources, including network/application users, local privileged accounts, and sophisticated attacks from within the database itself.

Save time and money with faster deployment and a more efficient architecture

Simplify the process of building custom security policies to audit and protect databases with preconfigured rules and templates.

Minimize risk and liability by identifying attacks as they occur, and stopping them before they cause damage

Stop breaches by terminating suspicious sessions and quarantining malicious users with real-time monitoring and intrusion prevention for Oracle, Microsoft SQL Server, and Sybase databases.

Increase your flexibility by deploying McAfee Database Activity Monitoring on the IT infrastructure of your choice

Install sensors on physical servers, provision sensors along with the database on virtual machines, and deploy sensors remotely on cloud servers.

Discover databases automatically and organize them for monitoring and management

Find databases by scanning the network or by importing them from existing tools, and then group them by vendor, version, or custom tags (for example, HR, finance, or QA).

Get out-of-the-box protection for known vulnerabilities and common threats

Receive more than 380 predefined rules that address specific issues patched by the database vendors, as well as generic attack profiles.

Leverage templates for compliance regulations

Use a simple, step-by-step interface for building customized security policies for PCI DSS, SOX, HIPAA, GLBA, and SAS-70, as well as best practices based on experience at hundreds of customer sites.

Receive granular protection of sensitive data at the object level, regardless of the source of the attack

Evaluate process memory to determine execution plan and affected objects, identifying policy violation even from local users or obfuscated code.

Get full auditing for MySQL databases for free

Bring enterprise-level database security to the MySQL open-source database management system and collect full audit-trail information from the database.

Ease management difficulties through integration with McAfee ePolicy Orchestrator (McAfee ePO)

McAfee Database Activity Monitoring integrates with the McAfee ePO software to provide a single pane, unified management platform for database security and other solutions.

System Requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Minimum System Requirements

  • McAfee ePolicy Orchestrator (ePO) 4.6 – 5.1
  • Microsoft Windows Server 2003 with Service Pack 2 (SP2) or higher
  • Microsoft SQL Server 2005 with SP1 or higher
  • 2 GB RAM
  • 1 GB free disk space
  • Browser (for management console): Firefox 2.0 or later, or Microsoft Internet Explorer 7.0 or later
  • Database Activity Monitoring server can be installed in 64-bit mode

Supported Databases for Monitoring

  • Oracle version 8.1.7 or later, running on Sun Solaris, IBM AIX, Linux, HP-UX, Microsoft Windows, including Exadata
  • Microsoft SQL 2000 and higher on any supported Windows platform
  • IBM DB2 LUW 9.5, 9.7, 10.1, and 10.5
  • Sybase ASE 12.5 or later on all supported platforms
  • Teradata 12, 13, 13.10, and 14 on Linux
  • IBM DB2 for Z/OS
  • IBM DB2 for iSeries (AS/400)
  • MySQL 5.1, 5.5, and 5.6 on Linux
  • MariaDB version 5.5 (5.5.32 and later) on Linux 32 and 64 bit

Video / Demos

Demos

Use a single solution and achieve continuous compliance with McAfee Configuration Control.

Videos

Learn how the McAfee Database Security Solution protects you from database breaches and falling victim to cybercrime. This solution includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring, and McAfee ePolicy Orchestrator software.

Customer Stories

State of Alaska

The State of Alaska saved money by consolidating with McAfee products.

Highlights
  • Saved a projected $3.8 million and improved operational and team efficiency
  • Dramatically improved security posture without increasing headcount
  • Allowed for greater budget predictability with the flexibility to adapt and grow security as needs change

News / Events

Resources

Data Sheets

McAfee Database Activity Monitoring

For a technical summary on the McAfee product listed above, please view the product data sheet.

McAfee Database Activity Monitoring (Dutch)

For a technical summary on the McAfee product listed above, please view the product data sheet.

Solution Briefs

Defend Legacy Databases and Operating Systems

McAfee has a simple, proven approach to securing EOL databases that combines two best-in-class technologies recognized by compliance officers as valid compensating control for legacy database platforms.

McAfee Database Security

McAfee Database Security offers real-time protection for business-critical databases from all types of threats: external, internal, and even intra-database exploits.

Top Five Reasons to Deploy a Dedicated Database Security Solution

Learn about the top five reasons why you should deploy a dedicated McAfee Database Security solution.

White Papers

A Practical Guide to Database Compliance

Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.

Database Activity Monitoring Best Practices

This document contains recommendations from McAfee for creating custom rules and rule objects. It should serve both as a starting point for the implementation of McAfee Database Activity Monitoring and as an example of the ease of rule creation and management.

Database Security in Virtualization and Cloud Computing Environments

Learn about the technology challenges when protecting databases in virtualized environments.

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention

McAfee Database Security Solution is the ultimate, multitiered software solution that can protect all databases and data assets — helping you ward off threats and eliminate vulnerabilities.

The Case for Continuous Compliance

McAfee Configuration Control eliminates manual processes and point product integration, providing single-console control for meeting compliance requirements.

Community

Blogs

  • Shedding light on ‘Shadow IT’
    David Small - January 9, 2014

    BYOD, BYOA, BYOx. The IT industry is full of acronyms depicting its constant evolution and relationship with the professional world. First came the devices; employees saw the power of personal devices and insisted on using them in the workplace. And so the consumerisation of IT was born. After the devices came the apps. Companies reported […]

    The post Shedding light on ‘Shadow IT’ appeared first on McAfee.

  • Walking the Talk on Public-Private Partnerships
    Tom Gann - August 16, 2013

    There’s been a lot of talk about the value of public-private partnerships in moving the U.S. toward a more robust cyber security posture. And let’s be honest:  there’s also been a lot of private sector skepticism about how much the Administration really believed in the concept or how much they would do to make it […]

    The post Walking the Talk on Public-Private Partnerships appeared first on McAfee.

  • Five Factors That Make D.C. Region a Cybersecurity Hub
    Tom Gann - May 29, 2013

    McAfee is based in Silicon Valley, but we know there’s more to tech than California. We recently joined the National Institute of Standards and Technology to launch the National Cybersecurity Center of Excellence, a joint effort among high-tech business, federal, state and local government and local universities located in Rockville, Md. The goal of the […]

    The post Five Factors That Make D.C. Region a Cybersecurity Hub appeared first on McAfee.

  • Getting Assurance in a Time Constrained World
    McAfee - May 20, 2013

    Nothing is as frustrating as when something goes wrong, especially when you have time constraints.  NIST has just released Special Publication 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations where a few notable items have been added to increase the confidence that security, practices, procedures and architectures of information systems […]

    The post Getting Assurance in a Time Constrained World appeared first on McAfee.

  • Response Now as Important as Prevention
    Leon Erlanger - February 24, 2012

    The National Institute of Standards and Technology (NIST) has updated its Computer Security Incident Handling Guide to take into account the increasingly dire state of cyber security. As anyone who has followed the rush of high-profile incursions over the past year knows, it’s looking less and less possible to prevent the inevitable attack, no matter […]

    The post Response Now as Important as Prevention appeared first on McAfee.