McAfee, Inc is an US global computer security software company, it says, the world’s largest dedicated security technology company.

McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely.

Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security.

McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. Specialties Endpoint Security, Network Security, Mobile Security, Data Leakage Prevention, Cloud Security, Web Security, Computer Security, Database Security.

E-SPIN and McAfee

E-SPIN have actively in promoting McAfee Risk & Compliance full range of products and technologies as part of the company Vulnerabiity Management, Security Management solution portfolio, far before McAfee accquired Sentrigo (A Database Security company provide end to end database security, vulnerability management, database activity monitoring, database virtual patching).

After McAfee accquisiton of the Sentrigo and incorporate it into Risk & Compliance portfolio, E-SPIN is continue to grow and remain as the one and the only in the region really specialize in provide end to end Risk and Compliance solution domain within McAfee and go beyond McAfee products and technologies due to the best of breed range of products and solutions represented by E-SPIN on risk and compliance, vulnerability management, security management, database security, SIEM and virtualization management.

Nowdays, E-SPIN is active in provide consulting, supply, training and maintaining McAfee products for the enterprise, government and military customers (or distribute/resell or bundled as part of the complete package) on the region E-SPIN do busineses. The enterprise range from university, telecommunications, government agencies, listed corporate, managed network services provider to security analysts and administrator / manager, risk and compliance auditor / manager, security consultants or Security Operation Center (SOC) / Security Information and Event Management (SIEM) applications.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.

McAfee Product Portfolio Overview

Advanced Threat Analysis

Combine sandboxing technology, dynamic code analysis, machine learning, and actionable threat reporting to identify sophisticated attacks and share threat intelligence insights across your entire environment.

Data Protection & Encryption

Protect sensitive data wherever it’s used—on premises, in the cloud, or at the endpoints—with products that expand visibility and control over the flow and use of your sensitive information.

Database Security

Get real-time protection for business-critical databases from external, internal, and even intra-database exploits, all in a software-based offering.

Endpoint Protection

Detect, prevent, and correct advanced threats with our new line of endpoint suites that make security integration, automation, and orchestration possible for all enterprises.

Network Security

Block malware and advanced targeted attacks on your network by using layered signature-less technologies that defend against never-before-seen threats and scale quickly across physical and virtual data centers.

Security Management

Gain visibility and control across your entire security ecosystem with a central, cross-product management platform that connects global threat intelligence, enterprise risk, and system security posture in real time.

Server Security

Secure private and public cloud workloads and servers with products that minimize CPU overhead, support all major virtualization environments, and centralize management.

Security Information & Event Management (SIEM)

Get real-time visibility into all activity on systems, networks, databases, and applications. Our SIEM offering generates the actionable intelligence you need to prioritize, investigate, and respond to threats.

Web Security

Enable secure web connectivity with technology that protects every device, user, and location from sophisticated internet threats. Available in cloud, on-premises, and hybrid deployment options.

McAfee Data Center Security Suite for Databases

Maximum data security, minimal impact on hardware resources

Real-time, reliable protection for business-critical databases

McAfee Data Center Security Suite for Databases gives you complete visibility into your database landscape and security posture.

Protect against external, internal, and intra-database threats

Safeguard databases with a software solution that requires no architecture changes or costly hardware.

See all database activity

Get a real-time view of activity, including local privileged user access and sophisticated attacks from within the database.

Protect unpatched databases

Detect and prevent attempted attacks and intrusions in real time without requiring database downtime or application testing.

Get single-pane manageability for database security

Centrally manage your database security with integrated McAfee ePolicy Orchestrator software.

Wider visibility with a single management platform

Automate database discovery

Perform a fully automated discovery of all databases within your environment to identify databases that contain sensitive data such as payment card information, Social Security numbers, and phone numbers.

Build a custom security policy

Choose from a preconfigured defense or build a custom security policy to help address the specific requirements of your organization.

Prioritize and remediate security gaps

Get actionable information to prioritize and remediate security gaps, saving time and money.

System requirements

McAfee Data Center Security Suite for Databases is a suite that includes database activity monitoring, vulnerability scanning, and virtual patching technologies.

These are the minimum system requirements. Actual requirements will vary depending on the nature of your environment. McAfee Data Center Security Suite for Databases includes the following products.

McAfee Database Activity Monitoring/McAfee Virtual Patching for Databases

Standalone Management Server Operating System

  • 2 GB RAM
  • 1 GB free disk space
  • Microsoft Windows 2008 or Microsoft Windows 2008 R2 or Microsoft Windows 2012, Microsoft Windows 2012 R2 or Microsoft Windows 2016 or Red Hat Linux 4.0 and later, or SUSE Linux 10.0 and later, or CentOS 4 and later

Backend Database

  • 2 GB RAM
  • 1 GB free disk space
  • Microsoft SQL Server 2008 up to 2014, or Oracle 11g and later

Browser (for management access)

  • Firefox 2.0 and later
  • Microsoft Internet Explorer 7.0 and later
  • Chrome

McAfee ePO Management

  • ePO 5.0 and later
  • McAfee Agent 4.8 with SP2 and later

Supported Databases for Monitoring

  • Oracle version 8.1.7 and later, running on Sun Solaris, IBM AIX, Linux, HP-UX, Microsoft Windows, including Oracle RAC and Oracle Exadata
  • Microsoft SQL 2000 and later on any supported Windows platform
  • IBM DB2 LUW 9.5, and later
  • Sybase ASE 12.5 and later on all supported platforms
  • Teradata 12, 13, 13.10, 14,15, and 15.1 on Linux
  • MySQL 5.1, 5.5, 5.6 and 5.7 on Linux
  • MariaDB version 5.5 (5.5.32 and later), 10.0 and 10.1 on Linux
  • IBM DB2 for Z/OS with CorreLog
  • IBM DB2 for iSeries (AS/400) with Raz-Lee
  • SAP HANA SPS 09, Revision 91 and later
  • PostgreSQL 9.2 and later on Linux

McAfee Vulnerability Manager for Databases

Protect your network databases

Find potential database security weaknesses

McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses.

Find common database security issues
Identify weak passwords, default accounts, and other common threats.

Scan for a wide range of vulnerabilities
Conduct more than 4,700 vulnerability checks against leading database systems, including Oracle, SQL Server, DB2, and MySQL.

Get out-of-the-box and custom compliance reports
View reports for PCI DSS and other regulations, as well as specific reports for stakeholders such as database administrators (DBAs), developers, and InfoSec users.

Centralize security management
McAfee Vulnerability Manager for Databases is managed with McAfee ePolicy Orchestrator, providing centralized reporting and summary information for thousands of databases.

Wider visibility with a single platform

Get unparalleled visibility into your database security posture
Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network.

Gain access to thousands of security verifications
Get comprehensive and up-to-date checks of the most popular database platforms and reporting on meaningful criteria such as version/patch level, changed objects, modified privileges, and forensic traces from common hacker tools.

Check passwords quickly and efficiently
Use a variety of techniques to detect weak and shared passwords, including hashed passwords such as SHA-1, MD5, and DES, by downloading data for local analysis to avoid affecting database performance.

System requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Platform Support

Standalone Management Server Operating System
  • 2 GB RAM
  • 1 GB free disk space
  • Microsoft Windows Server 2003 with Service Pack 2 (SP2) and later, or RedHat/Centos 5 and later
Backend Database
  • 2 GB RAM
  • 1 GB free disk space
  • Microsoft SQL Server 2005 with SP1 and later, or Oracle 9i and later
Browser (for management access)
  • Firefox 2.0 and later
  • Microsoft Internet Explorer 7.0 and later
  • Chrome
McAfee ePO Management
  • ePO 5.0 and later
  • McAfee Agent 4.8 with SP2 and later
Supported Databases for Scanning
  • Oracle 8i or later
  • Microsoft SQL Server 2000 or later
  • Microsoft SQL Azure
  • IBM DB2 8.1 or later for Linux, Unix, and Windows
  • MySQL version 4.0 or later
  • PostgreSQL version 8.3 or later
  • Sybase ASE version 12.5 or later
  • SAP HANA v1 and later
  • Teradata v12, v13, v14 — Database discovery, sensitive data discovery, custom checks, and password cracking
  • Informix v10.0, v11.1, v11.5, v11.7 — Database discovery, sensitive data discovery and custom checks

McAfee Application Control

Centrally managed whitelisting

Fast, flexible, and scalable protection against zero-day and advanced persistent threats

McAfee Application Control blocks unauthorized executables on servers, corporate desktops, and fixed-function devices.

Block threats without list management or signature updates
Save time and lower costs using a dynamic trust model, local and global reputation intelligence, real-time behavioral analytics, and auto-immunization of endpoints.

Stop unwanted applications
Block executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code.

Protect fixed-function, legacy systems, and modern IT investments
Safeguard older operating systems, such as Microsoft Windows NT, 2000, and XP as well as recent operating systems such as Microsoft Windows 10.

Reduce patch cycles and protect memory
Maintain regular patch cycles and prevent whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.

Thwart threats with intelligent whitelisting

Reduce risks from unauthorized applications and code
Know the reputation of every file and application in your environment and categorize them as good, bad, and unknown with real-time McAfee Global Threat Intelligence combined with local intelligence from McAfee Threat Intelligence Exchange, an optional module sold separately.

Leverage three whitelisting options
Default Deny allows software execution based on an approved whitelist or authorization by trusted channels. Detect and Deny allows software execution through signature-less reputation verification, and Verify and Deny allows the execution of applications that are verified by sandbox testing.

Balance protection and performance
Additional detection engines, including signatures, reputation, and real-time emulation, reduce the number of files requiring more resource-intensive malware sandbox analysis.

System requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Platform Support

Microsoft Windows

  • Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009, 8, 8.1 Industry, 10
  • Server: 2008, 2008 R2, 2012, 2012 R2
  • Desktop: NT, 2000, XP, Vista, 7, 8, 8.1, 10


  • Red Hat Enterprise Linux/CentOS 5, 6, 7
  • SUSE/openSUSE 10, 11
  • Oracle Enterprise Linux 5, 6, 7
  • Ubuntu 12.04

McAfee Change Control

Prevent unauthorized changes while automating compliance controls

Centralized change detection and management

McAfee Change Control eliminates change activity in server environments that can lead to security breaches, data loss, and outages.

Get instant alerts to changes
Protect critical system, configuration, and content files across distributed and remote locations by enabling instant change detection and sophisticated alerting mechanisms.

Meet regulatory compliance requirements
Fulfill PCI DSS regulation requirements and eliminate manual and resource-intensive compliance policies.

Protect critical applications
Prevent tampering with critical files and registry keys.

Keep servers up and running
Prevent change-related outages and delays.

Maintain compliance with minimal performance impact

Implement continuous file integrity monitoring
Comply with PCI DSS requirements with Change Control File Integrity Monitoring (FIM) software, continuously track changes to file and registry keys, and identify who made changes to specific files.

Block unwanted changes in your server environment
Protect critical system files, directories, and configurations from tampering with the included Change Prevention software. No changes to the server environment are permitted except those in accordance with set policies.

Leverage a small footprint and minimal operational overhead
Enjoy negligible impact on server performance with low memory usage, no file scanning to affect system performance, and easy-to-set-up software.

System requirements

These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.

Platform Support

Microsoft Windows

  • Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009, 8 Industry, 8.1
  • Server: 2008, 2008 R2, 2012, 2012 R2
  • Desktop: Vista, 7, 8, 8.1


  • AIX 6.1, 7.1


  • RHEL/CentOS 5, 6
  • SUSE/openSUSE 10, 11
  • OEL 5, 6
  • Ubuntu 12.04

McAfee Host Intrusion Prevention for Server

Proactive, zero-day protection for servers

Defend against known and new zero-day attacks

McAfee Host Intrusion Prevention for Server boosts server security and lowers costs by reducing the frequency and urgency of patching.

Secure against malicious attacks
Leverage powerful behavioral and signature analysis, plus a dynamic stateful firewall supported by cloud-based McAfee Global Threat Intelligence, to block emerging attacks in real time.

Free up IT resources
Protect against exploits that target new vulnerabilities, so your IT staff has more time for planning, testing, and deploying patches.

Maintain server uptime
McAfee Host Intrusion Prevention for Server includes specialized protection for web and database servers.

Save time and cut costs
Protect and manage servers across your entire enterprise with McAfee ePolicy Orchestrator, a scalable and centralized management platform.

Protection beyond the endpoint

Keep your business running smoothly
Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application.

Customize protection
Maintain system uptime and productivity with specialized protection that secures critical servers against attacks, including directory traversal and SQL injection attacks.

Prove compliance without headaches
Use easy-to-understand and actionable views, workflows, event monitoring, and reporting to quickly remediate threats and maintain compliance.

System requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

Platform Support

Operating Systems

  • Microsoft Windows (English, French, German, Japanese, Korean, Spanish, traditional Chinese)
  • Microsoft Windows Server 2008 (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Standard with Service Pack 2 (SP2) or higher (32-bit and 64-bit)
  • Microsoft Windows Server 2003 R2 Standard (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Enterprise with SP2 or higher (32-bit and 64-bit)
  • Microsoft Windows Server 2003 R2 Enterprise (32-bit and 64-bit)
  • Microsoft Windows Server 2003 Web with SP1 or higher
  • Microsoft Windows Server 2003 R2 Web
  • Microsoft Windows Server 2000 Advanced Server with SP4 or higher
  • Microsoft Windows Server 2000 Datacenter Server with SP4 or higher
  • Microsoft Windows Server 2000 Professional with SP4 or higher
  • Microsoft Windows Server 2000 Server with SP4 or higher
  • Red Hat Enterprise Linux 4.0 (32-bit); kernel modules supported:
    • 2.6.9-42.EL
    • 2.6.9-42.EL-smp
    • 2.6.9-34.EL
    • 2.6.9-34.EL-smp
    • 2.6.9-22.EL
    • 2.6.9-22.EL-smp
  • Sun Solaris
    • SPARC Solaris 10
    • SPARC Solaris 9 (32-bit or 64-bit kernel)
    • SPARC Solaris 8 (32-bit or 64-bit kernel)
  • SUSE Linux Enterprise 10, 11 (32-bit or 64-bit kernel)

Supported Web Server Platforms

  • IIS 4.0, 5.0, and 6.0 (Microsoft Windows)
  • Apache Web Server 2.0.42 or higher
  • Apache Web Server 1.3.6 or higher
  • Sun Java Web Server 6.1
  • Sun ONE Web Server 6.0

Supported Database Server Platforms

  • Microsoft SQL Server 2005 and 2008
McAfee Web Security Product Overview by E-SPIN

McAfee Server Security Suite Advanced

Comprehensive security for physical, virtual, and cloud deployments with whitelisting and change control. McAfee® Server Security Suite Advanced offers consistent and continuous protection across physical, virtual, and public cloud deployments. Comprehensive security includes foundational antivirus, firewall protection, intrusion prevention, whitelisting to protect from zero-day threats, and change control to meet regulatory compliance requirements. Advanced protection
IT & Security Risk Management

McAfee Server Security Suite Essentials

Consistent and continuous protection across physical, virtual, and cloud deployments McAfee®Server Security Suite Essentials offers consistent and continuous protection across physical, virtual, and public cloud deployments. Foundational security includes antivirus, firewall protection, and intrusion prevention to proactively secure against known and new zero-day attacks. Advanced protection minimizes performance impact on physical and virtual servers and
McAfee Security Suite for Virtual Desktop Infrastructure (VDI)
Improve virtual desktop security, with minimal impact on performance McAfee Security Suite for VDI provides anti-malware protection optimized for virtualization, whitelisting to protect from zero-day threats, desktop intrusion protection, and data protection. It also warns users about malicious websites and/ or blocks them. Manage security for your virtual desktops with a scalable security solution designed to

McAfee Server Security

Server security that protects your hybrid data centre, discover and protect workloads across all clouds and servers McAfee Server Security product deliver the industry’s most comprehensive solution for discovering, monitoring, and securing cloud workloads. They combine server security technologies to minimise CPU overhead, provide complete security controls for all essential workloads, support all major virtualisation
Trend toward Endpoint Protection Platforms (EPP) Market Endpoint Protection Market evolving to Endpoint Protection Platforms (EPP) Market From the recent Magic Quadrant for Endpoint Protection Platforms 2017, we notice that EPP market listing criteria rise again and now required vendor to demonstrate even more capability beyond their previous core technology offering. The current standard for
McAfee Web Security Product Overview by E-SPIN
Rethink your web protection. Secure any device, anywhere. Enable secure web connectivity and reduce the risk of malware intrusion and data loss Web security offerings from McAfee enable secure web connectivity for every device, user, and location, protecting organizations against sophisticated threats. Bringing together web filtering, content inspection, antivirus, zero-day anti-malware, SSL inspection, data loss
E-SPIN McAfee Advanced Threat Defense Product Overview
Detect advanced targeted attacks. McAfee® Advanced Threat Defense enables organizations to detect advanced targeted attacks and convert threat information into immediate action and protection. Unlike traditional sandboxes, it includes additional inspection capabilities that broaden detection and expose evasive threats. Tight integration between security solutions—from network to endpoint—enables instant sharing of threat information across the environment,
E-SPIN McAfee Application Data Monitor Product Overview
Detect hidden threats with application-layer inspection. The McAfee® Application Data Monitor appliance advances security and compliance beyond the limits of log management by monitoring all the way to the application layer. You can fully inspect application contents to achieve the deepest visibility into how your network is being used. The McAfee Application Data Monitor appliance decodes