McAfee Database Activity Monitoring automatically finds databases on your network, protects them with a set of preconfigured defenses, and helps you build a custom security policy for your environment — making it easier to demonstrate compliance to auditors and improve critical asset data protection. Database Activity Monitoring cost-effectively protects your data from all threats by monitoring activity locally on each database server and by alerting or terminating malicious behavior in real time, even when running in virtualized or cloud computing environments.
Comprehensive threat protection — Protect even your unpatched databases against zero-day attacks by blocking attacks that exploit known vulnerabilities and terminating sessions that violate your security policies.
Detailed audit trail reports — Audit trail reports are available to meet SOX, PCI, and other compliance audit requirements. During post-incident forensic analysis, this audit trail can help you understand the amount of lost data and gain greater insight into malicious activity.
Streamlined patching with no required downtime — Applying missing patches and fixing misconfigurations found by the Database Activity Monitoring vulnerability scan will improve the security posture of your databases immediately — without requiring any downtime via McAfee’s virtual patching technology.
ePolicy Orchestrator (ePO) integration — McAfee Database Activity Monitor can be directly managed with the ePO platform, providing centralized reporting and summary information for thousands of databases in a single, consistent dashboard.
Demonstrate compliance and minimize the likelihood of a breach by monitoring threats to databases from all sources, including network/application users, local privileged accounts, and sophisticated attacks from within the database itself.
Simplify the process of building custom security policies to audit and protect databases with preconfigured rules and templates.
Stop breaches by terminating suspicious sessions and quarantining malicious users with real-time monitoring and intrusion prevention for Oracle, Microsoft SQL Server, and Sybase databases.
Install sensors on physical servers, provision sensors along with the database on virtual machines, and deploy sensors remotely on cloud servers.
Find databases by scanning the network or by importing them from existing tools, and then group them by vendor, version, or custom tags (for example, HR, finance, or QA).
Receive more than 380 predefined rules that address specific issues patched by the database vendors, as well as generic attack profiles.
Use a simple, step-by-step interface for building customized security policies for PCI DSS, SOX, HIPAA, GLBA, and SAS-70, as well as best practices based on experience at hundreds of customer sites.
Evaluate process memory to determine execution plan and affected objects, identifying policy violation even from local users or obfuscated code.
Bring enterprise-level database security to the MySQL open-source database management system and collect full audit-trail information from the database.
McAfee Database Activity Monitoring integrates with the McAfee ePO software to provide a single pane, unified management platform for database security and other solutions.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Learn how the McAfee Database Security Solution protects you from database breaches and falling victim to cybercrime. This solution includes McAfee Vulnerability Manager for Databases, McAfee Database Activity Monitoring, and McAfee ePolicy Orchestrator software.
Implementing Real-Time Database Activity Monitoring
Topics : Database Security
For a technical summary on the McAfee product listed above, please view the product data sheet.