McAfee Database User Identifier accurately identifies end-user activity when using pooled connections from the application to the database, making it possible to hold users accountable for their transactions and helping to bring organizations into compliance with regulations. With Database User Identifier, you can gain visibility into risks to sensitive data and gather actionable information to address these risks.
Dependable end-to-end user tracking — Database User Identifier is installed on JavaEE and .NET application servers as a separate container, where it injects the end-user information into the pooled database connection and associates every database session, SQL statement, and command with individual users.
Software-only solution, non-intrusive, and easy to deploy and maintain — As a software component, Database User Identifier is installed on the application servers and does not require any change to the underlying applications or database management system.
Actionable alerting on specific end-user activity — Information from Database User Identifier can be used by McAfee Database Activity Monitoring to create granular rules to specifically alert or block users based on application activity.
Identify every user action and name, including user details, the URL used, and the client IP address.
Get a reliable audit log by appending the application end-user credentials to every transaction hitting the database.
Avoid development costs associated with changes to underlying applications or database management systems and provide a complete audit trail of user activity.
Meet strict compliance regulations and standards such as PCI DSS, SOX, HIPAA, and SAS 70 that focus on controlling individual access to sensitive data.
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
For a technical summary on the McAfee product listed above, please view the product data sheet.
McAfee Database Security offers real-time protection for business-critical databases from all types of threats: external, internal, and even intra-database exploits.
Learn about the top five reasons why you should deploy a dedicated McAfee Database Security solution.
My travels have continued over the past few weeks. First stop – South Africa, where I met with some of our customers and partners. It’s an exciting time for Africa at the moment in terms of opportunity. According to Canalys, Africa is leading growth in EMEA with a year-on-year growth rate of almost 15%. The […]
The post From South Africa to Cork: McAfee EMEA, One Great Team! appeared first on McAfee.