McAfee Application Data Monitor

Detect hidden threats with application-layer inspection

Application-layer monitoring for maximum threat prevention

McAfee Application Data Monitor detects fraud, data loss, and advanced threats by monitoring all the way to the application layer.

Deep visibility into how your network is being used

Get accurate analysis of real application use to enforce policies and detect malicious, covert traffic.

Full session details of all violations

Decode the entire application session, all the way to Layer 7, for more than 500 hundred supported applications and protocols.

Comprehensive audit trails

Generate a complete audit trail of application events for compliance, passively, to avoid application interference.

Integrated with your infrastructure

McAfee Enterprise Security Manager and McAfee Application Data Monitor work with your security infrastructure to simplify security operations, improve efficiencies, and lower costs.

Understand how your network is being used

Find application-layer threats

See the entire content of an application and underlying protocols—such as an executable embedded inside a PDF document—to detect hidden payloads, malware, and even covert communication channels.

Uncover data loss and compliance violations

Detect when sensitive information is being transmitted inside email attachments, instant messages, file transfers, HTTP posts, or any other application, and get immediate notification so you can mitigate the loss.

Discover documents

Identify more than 500 document types as they are exchanged over the network. Even documents embedded inside other documents, archived, compressed, and encoded are discovered with actionable metrics.

A Gartner Magic Quadrant Leader

McAfee is a leader in the Gartner Magic Quadrant for SIEM for the seventh year in a row.

McAfee Connect

Maximize the value of your McAfee Enterprise Security Manager with pre-built content packs to streamline security monitoring, threat management, and incident response.

Learn More

System requirements

McAfee Application Data Monitor (ADM) deployment options include physical and virtual appliances. Specific McAfee Application Data Monitor models require McAfee Enterprise Security Manager (ESM). McAfee SIEM appliance specifications and descriptions are provided for information only, subject to change without notice, and provided without warranty of any kind, expressed or implied.

Cloud
Model Number Deployment Local Storage1 CPU Cores System Requirements
ADM-VM ESX Recommended 250 GB 8 8 Processor Cores, 16 GB RAM
ADM-VM-4-CORE-ADDON ESX See footnote 2 See footnote 3 Per 4 Core Add-on, 16 GB RAM


Appliances
Model Number Appliance Size Local Storage1 CPU Cores System Requirements
ADM-1270 1U 4 TB 4 Requires ESM
ADM-3500 2U 12 TB 22 Requires ESM

1Usable event and flow data storage capacity will vary by customer event types, event rates, software version, and other factors.
2ERC, ACE, and ADM do not support upgrades to the original storage allocation, so it is recommended that 1 TB of storage be allocated for the base VM and 1 TB for each 4-CORE-ADDON. It is recommended that VMs have dedicated SSD storage to reach higher ingestion and query performance.
3Option to expand in 4-core increments up to 32-core maximum.

Need additional technical resources? Visit the McAfee Expert Center >

Learn more about McAfee Application Data Monitor

Report

Gartner Magic Quadrant for Security Information and Event Management

Gartner names McAfee as a Magic Quadrant Leader for SIEM. The Gartner Magic Quadrant for SIEM is a research tool for enterprise security buyers to review and assess which vendors best meet their needs.

Read Report >
Data Sheet

McAfee Application Data Monitor

McAfee Application Data Monitor inspects all the way to the application layer to detect fraud, data loss, and advanced threats.

Read Data Sheet >
White Paper

Sustainable Security Operations

Discover how to successfully adopt sustainable security operations with optimized processes and tools to compress decision-making and quickly detect, contain, and remediate attacks.

Read White Paper >

This remains the top SIEM available.
Read Product Review > SC Magazine

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us