McAfee Database Activity Monitoring, 1Y, Gold, 10001+u DBMYCM-AA-JG データシート

製品コード
DBMYCM-AA-JG
ページ / 2
Data Sheet
Key Advantages
Maximizes visibility and protection 
from all sources of attacks
Monitors external threats, privileged 
insiders, and sophisticated threats 
from within the database
Minimizes risk and liability by 
stopping attacks before they      
cause damage 
Saves time and money with faster 
deployment and a more efficient 
architecture 
Gives you the flexibility to easily 
deploy on the IT infrastructure      
you choose
Integrates with core McAfee 
products, such as the McAfee    
ePolicy Orchestrator
®
 (McAfee ePO
management platform and McAfee 
Vulnerability Manager for Databases
With McAfee Database Activity Monitoring,
organizations gain visibility into all database
activity, including local privileged access and
sophisticated attacks from within the database.
McAfee Database Activity Monitoring helps
them protect their most valuable and sensitive
data from external threats and malicious insiders.
In addition to providing a reliable audit trail,
McAfee Database Activity Monitoring also
prevents intrusion by terminating sessions
that violate security policy.
With McAfee Database Activity Monitoring
organizations can:
Quickly build a custom security policy to meet
industry regulations or internal IT governance
standards
Log access to sensitive data for audit purposes,
including complete transaction details
Terminate sessions violating policies and
quarantine suspicious users, preventing data
from being compromised
Maintain separation of duties as required by
many regulations
McAfee Database Activity Monitoring cost
effectively protects your data from all threats
by monitoring activity locally on each database
server and by alerting or terminating malicious
behavior in real time, even when running in
virtualized or cloud computing environments.
Protection from All Database Threat Vectors
Attacks targeting valuable data stored in data-
bases can come from across the network,
from local users logged into the server itself,
and even from inside the database itself via
stored procedures or triggers. McAfee Database
Activity Monitoring uses memory-based sensors
to catch all three types of threats with a single,
nonintrusive solution. This information can then
be used to demonstrate compliance for audit
purposes and to improve security overall for an
organization’s most valuable data.
Identify Threats as They Occur, Reducing    
Risk and Liability 
Unlike basic auditing or log analysis, which only
tell you what happened after the fact, real-time
monitoring and intrusion prevention capabilities
stop breaches before they cause damage. Alerts
are sent directly to the monitoring dashboard with
full details of the policy violation for remediation
purposes. High-risk violations can be configured
to automatically terminate suspicious sessions and
quarantine malicious users, allowing time for the
security team to investigate the intrusion.
McAfee Database Activity Monitoring
Cost-effective database protection to meet your compliance requirements
Organizations store their most valuable and sensitive data in a database, but perimeter
protection and basic security provided with the database don’t protect you from
today’s sophisticated hackers or potential threats from rogue insiders. Research
1
shows
that more than 92 percent of records breached involved a database, with more than
87 percent based on exploits requiring significant technical skills. McAfee
®
Database
Activity Monitoring automatically finds databases on your network, protects them with
a set of preconfigured defenses, and helps you build a custom security policy for your
environment—making it easier to demonstrate compliance to auditors and improving
protection of critical data assets.
1  Verizon Business Study, 2010