McAfee Application Data Monitor

Detect hidden threats with application-layer inspection

Application-layer monitoring for maximum threat prevention

McAfee Application Data Monitor detects fraud, data loss, and advanced threats by monitoring all the way to the application layer.

Deep visibility into how your network is being used

Get accurate analysis of real application use to enforce policies and detect malicious, covert traffic.

Full session details of all violations

Decode the entire application session, all the way to Layer 7, for more than 500 hundred supported applications and protocols.

Comprehensive audit trails

Generate a complete audit trail of application events for compliance, passively, to avoid application interference.

Integrated with your infrastructure

McAfee Enterprise Security Manager and McAfee Application Data Monitor work with your security infrastructure to simplify security operations, improve efficiencies, and lower costs.

Understand how your network is being used

Find application-layer threats

See the entire content of an application and underlying protocols—such as an executable embedded inside a PDF document—to detect hidden payloads, malware, and even covert communication channels.

Uncover data loss and compliance violations

Detect when sensitive information is being transmitted inside email attachments, instant messages, file transfers, HTTP posts, or any other application, and get immediate notification so you can mitigate the loss.

Discover documents

Identify more than 500 document types as they are exchanged over the network. Even documents embedded inside other documents, archived, compressed, and encoded are discovered with actionable metrics.

A Gartner Magic Quadrant Leader

A Gartner Magic Quadrant Leader

McAfee is a leader in the latest Gartner Magic Quadrant for SIEM.

System requirements

McAfee Application Data Monitor (ADM) deployment options include physical and virtual appliances. Specific McAfee Application Data Monitor models require McAfee Enterprise Security Manager (ESM). McAfee SIEM appliance specifications and descriptions are provided for information only, subject to change without notice, and provided without warranty of any kind, expressed or implied.

Model Number Throughput Appliance Size Local Storage1 CPU Cores System Requirements
ADM-VM-8 250 Mbps VM Recommended 250GB 8 VM (AWS, ESX, KVM), 4GB memory
ADM-VM-12 500 Mbps VM Recommended 500GB+240GB SSD2 12 VM (AWS, ESX, KVM), 64GB memory
APM-1270 10 Gbps 1U 4 TB 4 Requires ESM or ETM
APM-3500 10 Gbps 2U 12 TB 22 Requires ESM or ETM

1Usable event and flow data storage capacity will vary by customer event types, event rates, software version, and other factors.
2Minimum 50K IOPS for SSD; additional storage should be a minimum of 100 IOPS.

Need additional technical resources? Visit the McAfee Expert Center >

Learn more about McAfee Application Data Monitor

REPORT

Gartner: Critical Capabilities for Security Information and Event Management

As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.

Read Report >
DATA SHEET

McAfee Application Data Monitor

McAfee Application Data Monitor inspects all the way to the application layer to detect fraud, data loss, and advanced threats.

Read Data Sheet >
WHITE PAPER

Sustainable Security Operations

Discover how to successfully adopt sustainable security operations with optimized processes and tools to compress decision-making and quickly detect, contain, and remediate attacks.

Read White Paper >
Probably the most comprehensive and powerful SIEM we’ve seen.
Read Product Review > SC Magazine

McAfee’s integrated approach enabled efficient, accurate detection and analysis of threats from all vectors.

Read Product Review > ESG

Recommended for you

Have Additional Questions?

We’re here to help. Contact us to learn about implementation, pricing, technical specifications, and more.

Contact Us
Back to top