McAfee Application Data Monitor

McAfee Application Data Monitor

Detect fraud, data loss, and hidden threats with application-layer inspection

Next Steps:

Overview

The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text of an email or its attachments). This level of detail allows accurate analysis of real application use, while also enabling you to enforce application use policies and detect malicious, covert traffic.

Identify data loss and compliance violations — The Application Data Monitor appliance detects when sensitive information is being transmitted inside email attachments, instant messages, file transfers, HTTP posts, or any other application, notifying you immediately and mitigating any loss. You can detect these sensitive data types, alert appropriate personnel, and log the transgression to maintain an audit trail for compliance audit requirements.

Detect application-layer threats — New, sophisticated threats exploit the vulnerabilities in common business applications to penetrate your network and export sensitive data. While these application-layer threats are difficult to detect using traditional firewalls and intrusion detection and intrusion prevention systems, the Application Data Monitor appliance is able to look into the entire contents of an application — including the underlying protocols — to detect hidden payloads, malware, and even covert communication channels.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM

Features & Benefits

Capture full session detail of all violations

Go beyond application flow monitoring to decode the entire application session, all the way to Layer 7.

Leverage pre-built detection rules for regulated and sensitive data

Monitor access to and use of sensitive information such as credit card numbers, social security numbers, and bank routing numbers out of the box, or customize the McAfee Application Data Monitor appliance’s detection capabilities by defining your own dictionaries of sensitive and confidential information.

Document a complete audit trail of application events for compliance

Preserve all details of application sessions that violate policies for use in incident response, forensics, and compliance audits.

Avoid interference with application performance and latency

Deploy Application Data Monitor as a passive SPAN port for passive monitoring, with no risk to an application's operation, performance, or reliability.

Add application insight into McAfee Enterprise Security Manager

Use McAfee Enterprise Security Manager as a central resource and interface for all monitoring and compliance activities and use application contents in event correlation and other advanced SIEM functions.

System Requirements

Hardware Specifications APM-3450 APM-1250
Throughput 1 Gbps 500 Mbps
Interfaces 4 x 10/100/1000 Mbps Ethernet copper interfaces 4 x 10/100/1000 Mbps Ethernet copper interfaces

Demos / Tutorials

Demos

Built for big security data, McAfee Global Threat Intelligence for McAfee Enterprise Security Manager (ESM) puts the power of McAfee Labs directly into the security monitoring flow using McAfee’s high-speed, highly intelligent security information and event management (SIEM) solution.

Awards / Reviews

Gartner
McAfee Positioned as a Leader by Gartner in MQ for SIEM Based on Completeness of Vision and Ability to Execute

The security information and event management (SIEM) market is defined by the customer's need to analyze security event data in real time for internal and external threat management, and to collect, store, analyze and report on log data for regulatory compliance and forensics. The vendors that are included in Gartner’s analysis have technologies that have been designed for this purpose, and they actively market and sell these technologies to the security buying center.

Customer Stories

McAfee

McAfee integrates NitroSecurity products into its portfolio, improving its SIEM offering.

Highlights
  • Significantly shortens time to analyze security events from four to six days to less than 10 minutes
  • Decreases time to produce PCI compliance reports from eight to 12 hours to 10 minutes
  • Saves administrative time and manual maintenance while eliminating unnecessary activities
  • Facilitates disaster recovery and allows for proper use of virtual machines
  • Improves the organization’s overall security posture in the industry

Resources

Brochures

Focus on 5 - Threat Intelligence SIEM Requirements

McAfee spoke with customers about integrating SIEM with Threat Intelligence and how it helped their effort to mitigate bad actors.

Focus on 5 - SIEM Requirements

Learn about the top five issues with SIEM: Big Security Data, Content and User Awareness, Dynamic Context, Solution Customization, and Business Value.

Data Sheets

McAfee Collector Plug-in

For a technical summary on the McAfee product listed above, please view the product data sheet.

Application Data Monitor

For a technical summary on the McAfee product listed above, please view the product data sheet.

Reports

Security Management 2.0—Time to Replace Your SIEM?

This report takes a candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.

Pike Pulse Report: Smart Grid Cyber Security Governance, Risk Management, and Compliance

This Pike Pulse report presents an analysis of the current governance, risk management, and compliance (GRC) vendors that are believed to be the best positioned for the future. McAfee scores the highest in assessment of GRC vendors for smart grid security.

McAfee Positioned in Leaders Quadrant of the Magic Quadrant for SIEM

Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Leading analyst firm Gartner has placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.

[Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]

Solution Briefs

Set the Standard for a Vastly Improved Security Posture

Learn how McAfee IT uses the McAfee SIEM with other McAfee products to provide the highest level of visibility and situational awareness to protect critical information and infrastructure, achieve PCI compliance, and leverage virtual machines in the McAfee security infrastructure.

Technology Blueprints

Achieve Situational Awareness

The McAfee solution has two primary components: McAfee ePolicy Orchestrator (McAfee ePO) software and McAfee Enterprise Security Manager, with additional integrations to extend visibility and control across the entire security and compliance management environment.

White Papers

The Big Security Data Challenge

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Security Management 2.5 – Replacing Your SIEM Yet?

This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we are certain it will help you avoid foundering on bad technology and inter-office politics. You owe it to yourself and your organization to ask the right questions and to get answers. It is time to slay the sacred cow of your substantial SIEM investment, and to figure out your best path forward.

Security Information and Event Management

McAfee EDB data management technology handles all of these SIEM/logging requirements. It is designed, implemented, maintained, and tested by our world-class in-house development team to meet the demanding requirements of SIEM/logging and leverage all of the capabilities of appropriate emerging technologies such as modern operating systems, multicore CPUs, solid state and RAM drives, and large amounts of main memory.

Pike Research: Monitoring and Securing SCADA Networks

This white paper examines cyber security issues for industrial control systems with a specific focus on security event monitoring as it applies to industrial control networks such as SCADA.

Continuous Compliance: Is It a Reality?

In this paper, we explore the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.

Community

Blogs

Threats and Risks