McAfee Database Activity Monitoring, Prod+ 1Y, Gold, 26-50u DBMCKE-AA-BG Data Sheet
Product codes
DBMCKE-AA-BG
Data Sheet
Key Advantages
•
Maximizes visibility and protection
from all sources of attacks
from all sources of attacks
•
Monitors external threats, privileged
insiders, and sophisticated threats
from within the database
insiders, and sophisticated threats
from within the database
•
Minimizes risk and liability by
stopping attacks before they
cause damage
stopping attacks before they
cause damage
•
Saves time and money with faster
deployment and a more efficient
architecture
deployment and a more efficient
architecture
•
Gives you the flexibility to easily
deploy on the IT infrastructure
you choose
deploy on the IT infrastructure
you choose
•
Integrates with core McAfee
products, such as the McAfee
ePolicy Orchestrator
products, such as the McAfee
ePolicy Orchestrator
®
(McAfee ePO
™
)
management platform and McAfee
Vulnerability Manager for Databases
With McAfee Database Activity Monitoring,
organizations gain visibility into all database
activity, including local privileged access and
sophisticated attacks from within the database.
McAfee Database Activity Monitoring helps
them protect their most valuable and sensitive
data from external threats and malicious insiders.
In addition to providing a reliable audit trail,
McAfee Database Activity Monitoring also
prevents intrusion by terminating sessions
that violate security policy.
activity, including local privileged access and
sophisticated attacks from within the database.
McAfee Database Activity Monitoring helps
them protect their most valuable and sensitive
data from external threats and malicious insiders.
In addition to providing a reliable audit trail,
McAfee Database Activity Monitoring also
prevents intrusion by terminating sessions
that violate security policy.
With McAfee Database Activity Monitoring
organizations can:
•
Quickly build a custom security policy to meet
industry regulations or internal IT governance
standards
standards
•
Log access to sensitive data for audit purposes,
including complete transaction details
including complete transaction details
•
Terminate sessions violating policies and
quarantine suspicious users, preventing data
from being compromised
•
Maintain separation of duties as required by
many regulations
many regulations
McAfee Database Activity Monitoring cost
effectively protects your data from all threats
by monitoring activity locally on each database
effectively protects your data from all threats
by monitoring activity locally on each database
server and by alerting or terminating malicious
behavior in real time, even when running in
virtualized or cloud computing environments.
behavior in real time, even when running in
virtualized or cloud computing environments.
Protection from All Database Threat Vectors
Attacks targeting valuable data stored in data-
bases can come from across the network,
from local users logged into the server itself,
and even from inside the database itself via
stored procedures or triggers. McAfee Database
and even from inside the database itself via
stored procedures or triggers. McAfee Database
Activity Monitoring uses memory-based sensors
to catch all three types of threats with a single,
nonintrusive solution. This information can then
nonintrusive solution. This information can then
be used to demonstrate compliance for audit
purposes and to improve security overall for an
organization’s most valuable data.
purposes and to improve security overall for an
organization’s most valuable data.
Identify Threats as They Occur, Reducing
Risk and Liability
Risk and Liability
Unlike basic auditing or log analysis, which only
tell you what happened after the fact, real-time
monitoring and intrusion prevention capabilities
stop breaches before they cause damage. Alerts
are sent directly to the monitoring dashboard with
full details of the policy violation for remediation
purposes. High-risk violations can be configured
to automatically terminate suspicious sessions and
quarantine malicious users, allowing time for the
security team to investigate the intrusion.
tell you what happened after the fact, real-time
monitoring and intrusion prevention capabilities
stop breaches before they cause damage. Alerts
are sent directly to the monitoring dashboard with
full details of the policy violation for remediation
purposes. High-risk violations can be configured
to automatically terminate suspicious sessions and
quarantine malicious users, allowing time for the
security team to investigate the intrusion.
McAfee Database Activity Monitoring
Cost-effective database protection to meet your compliance requirements
Organizations store their most valuable and sensitive data in a database, but perimeter
protection and basic security provided with the database don’t protect you from
today’s sophisticated hackers or potential threats from rogue insiders. Research
1
shows
that more than 92 percent of records breached involved a database, with more than
87 percent based on exploits requiring significant technical skills. McAfee
87 percent based on exploits requiring significant technical skills. McAfee
®
Database
Activity Monitoring automatically finds databases on your network, protects them with
a set of preconfigured defenses, and helps you build a custom security policy for your
environment—making it easier to demonstrate compliance to auditors and improving
protection of critical data assets.
environment—making it easier to demonstrate compliance to auditors and improving
protection of critical data assets.
1 Verizon Business Study, 2010