McAfee Database Event Monitor for SIEM

Maximum visibility into database transactions

Insights into who is accessing your data and why

McAfee Database Event Monitor for SIEM provides a complete audit trail of all database activities, including queries, results, authentication activity, and privilege escalations.

Full visibility

Consolidate database activity into a central audit repository and provide normalization, correlation, analysis, and reporting.

Automated compliance processes

Use policy-based detection rules and compliance reports for PCI DSS, HIPAA, and NERC-CIP. McAfee Database Event Monitor for SIEM also delivers compliant storage and masking of sensitive data in activity logs.

Power without the overhead

Use a passive network-based database log monitor for zero impact on database performance.

Integrated with your infrastructure

Full integration with McAfee Enterprise Security Manager enables database transactions for event correlation and other advanced SIEM activities.

Detailed security logging of databases and applications

Expand visibility into each transaction

Maintain full session details of all transactions, so you can easily see what happened before and after any given transaction—from login to logout—with a single mouse click.

Advance risk and threat detection

Analyze all monitored activity against a customizable set of policy rules and receive alerts on all suspicious activity. Anomaly-based detection indicates abnormal user activity, queries, and other out-of-place behavior.

Detect and classify databases

Discover all database instances, including unknown or rogue databases, and identify which databases are storing credit cards, social security numbers, or other sensitive data.

A Gartner Magic Quadrant Leader

A Gartner Magic Quadrant Leader

McAfee is a leader in the latest Gartner Magic Quadrant for SIEM.

System requirements

McAfee Database Event Monitor requires McAfee Enterprise Security Manager (ESM) and can be deployed as a physical appliance. McAfee SIEM appliance specifications and descriptions are provided for information only, subject to change without notice, and provided without warranty of any kind, expressed or implied.

Model Number Maximum EPS1 Appliance Size Local Storage2 Network Interfaces (10/100/1000) System Requirements
DEM-2600 5,000 2U 1.8TB 2 + 4 monitoring ports3 Requires ESM
DEM-4600 15,000 2U 3TB 2 + 8 monitoring ports3 Requires ESM

1Based on typical network environments using average event and flow aggregation. Depending on aggregation settings, collection type mix, overall SIEM activity, and related activities, the EPS levels for any given appliance, within an environment, may be lower.
2Usable event and flow data storage capacity will vary by customer event types, event rates, software version, and other factors.
3IPMI: Please note that all McAfee SIEM appliances, except DAS-50 and DAS-100, have IPMI adapters; for ERC HA, IPMI is used for the HA configuration.

Need additional technical resources? Visit the McAfee Expert Center >

Learn more about McAfee Database Event Monitor for SIEM

REPORT

Gartner: Critical Capabilities for Security Information and Event Management

As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.

Read Report >
DATA SHEET

McAfee Database Event Monitor for SIEM

McAfee Database Event Monitor for SIEM provides a complete audit trail of all database activities, including queries, results, authentication activity, and privilege escalations, widening your visibility into who’s accessing your data.

Read Data Sheet >
WHITE PAPER

Sustainable Security Operations

Discover how to successfully adopt sustainable security operations with optimized processes and tools to compress decision-making and quickly detect, contain, and remediate attacks.

Read White Paper >
This remains the top SIEM available.
Read Product Review > SC Magazine

McAfee’s integrated approach enabled efficient, accurate detection and analysis of threats from all vectors.

Read Product Review > ESG

Recommended for you

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us
Back to top