According to a 2010 Verizon Business study, more than 90% of records breached involved a database, with over 87% based on exploits requiring significant technical skills.
We need to take studies like this as an important lesson about security management. In our profession, it is always necessary to have the right tools for the right job. The challenge truly lies in not letting these tools get dull and rusty – thus inviting our adversaries to quickly take advantage.
Today, I am excited to share that McAfee has officially released new versions of its Vulnerability Manager for Databases and Database Activity Monitoring products, which are all a part of McAfee’s mission to meet this challenge – and our relentless pursuit of safe. McAfee’s Database Security solution allows organizations to protect their databases from external, internal and intra-database threats in real-time, all without costly architecture changes or downtime. New features include protection for Teradata databases, a free database audit plug-in for MySQL, and greatly-enhanced security management efficiency with the ability to manage database security outside of its own silo through the full integration of McAfee Vulnerability Manager for Databases into the McAfee ePO infrastructure.
Other features & benefits include:
Maximum Protection & Compliance:Organizations can demonstrate compliance and minimize the likelihood of a breach by monitoring threats to databases from all sources, including network/application users, local privileged accounts, and sophisticated attacks from within the database itself.
Time & Money Savings: McAfee also offers a simple, step-by-step interface to simplify the process of building customized security policies, as well as best practices based on experience at hundreds of customer sites.
Minimized Risk & Liability: McAfee Database Activity Monitoring can actually identify attacks as they occur in real time, and stop them before they cause damage by terminating suspicious sessions and quarantining malicious users.
Increased Flexibility: Organizations can deploy on the IT infrastructure of their choice by installing sensors on physical servers, provision sensors along with the database on virtual machines, and deploying sensors remotely on cloud servers.
About the Author
Categories: Cloud Security