- McAfee
- McAfee Product Portfolio Overview
- McAfee Data Center Security Suite for Databases
- McAfee Vulnerability Manager for Databases
- McAfee Application Control
- McAfee Change Control
- McAfee Host Intrusion Prevention for Server
McAfee
McAfee, Inc is an US global computer security software company, it says, the world’s largest dedicated security technology company.
McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse and shop the Web more securely.
Backed by its unrivaled Global Threat Intelligence, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security.
McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. Specialties Endpoint Security, Network Security, Mobile Security, Data Leakage Prevention, Cloud Security, Web Security, Computer Security, Database Security.
E-SPIN and McAfee
E-SPIN have actively in promoting McAfee Risk & Compliance full range of products and technologies as part of the company Vulnerabiity Management, Security Management solution portfolio, far before McAfee accquired Sentrigo (A Database Security company provide end to end database security, vulnerability management, database activity monitoring, database virtual patching).
After McAfee accquisiton of the Sentrigo and incorporate it into Risk & Compliance portfolio, E-SPIN is continue to grow and remain as the one and the only in the region really specialize in provide end to end Risk and Compliance solution domain within McAfee and go beyond McAfee products and technologies due to the best of breed range of products and solutions represented by E-SPIN on risk and compliance, vulnerability management, security management, database security, SIEM and virtualization management.
Nowdays, E-SPIN is active in provide consulting, supply, training and maintaining McAfee products for the enterprise, government and military customers (or distribute/resell or bundled as part of the complete package) on the region E-SPIN do busineses. The enterprise range from university, telecommunications, government agencies, listed corporate, managed network services provider to security analysts and administrator / manager, risk and compliance auditor / manager, security consultants or Security Operation Center (SOC) / Security Information and Event Management (SIEM) applications.
Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.
McAfee Product Portfolio Overview
Advanced Threat Analysis
Combine sandboxing technology, dynamic code analysis, machine learning, and actionable threat reporting to identify sophisticated attacks and share threat intelligence insights across your entire environment.
Data Protection & Encryption
Protect sensitive data wherever it’s used—on premises, in the cloud, or at the endpoints—with products that expand visibility and control over the flow and use of your sensitive information.
Database Security
Get real-time protection for business-critical databases from external, internal, and even intra-database exploits, all in a software-based offering.
Endpoint Protection
Detect, prevent, and correct advanced threats with our new line of endpoint suites that make security integration, automation, and orchestration possible for all enterprises.
Network Security
Block malware and advanced targeted attacks on your network by using layered signature-less technologies that defend against never-before-seen threats and scale quickly across physical and virtual data centers.
Security Management
Gain visibility and control across your entire security ecosystem with a central, cross-product management platform that connects global threat intelligence, enterprise risk, and system security posture in real time.
Server Security
Secure private and public cloud workloads and servers with products that minimize CPU overhead, support all major virtualization environments, and centralize management.
Security Information & Event Management (SIEM)
Get real-time visibility into all activity on systems, networks, databases, and applications. Our SIEM offering generates the actionable intelligence you need to prioritize, investigate, and respond to threats.
Web Security
Enable secure web connectivity with technology that protects every device, user, and location from sophisticated internet threats. Available in cloud, on-premises, and hybrid deployment options.
McAfee Data Center Security Suite for Databases
Maximum data security, minimal impact on hardware resources
Real-time, reliable protection for business-critical databases
McAfee Data Center Security Suite for Databases gives you complete visibility into your database landscape and security posture.
Protect against external, internal, and intra-database threats
Safeguard databases with a software solution that requires no architecture changes or costly hardware.
See all database activity
Get a real-time view of activity, including local privileged user access and sophisticated attacks from within the database.
Protect unpatched databases
Detect and prevent attempted attacks and intrusions in real time without requiring database downtime or application testing.
Get single-pane manageability for database security
Centrally manage your database security with integrated McAfee ePolicy Orchestrator software.
Wider visibility with a single management platform
Automate database discovery
Perform a fully automated discovery of all databases within your environment to identify databases that contain sensitive data such as payment card information, Social Security numbers, and phone numbers.
Build a custom security policy
Choose from a preconfigured defense or build a custom security policy to help address the specific requirements of your organization.
Prioritize and remediate security gaps
Get actionable information to prioritize and remediate security gaps, saving time and money.
System requirements
McAfee Data Center Security Suite for Databases is a suite that includes database activity monitoring, vulnerability scanning, and virtual patching technologies.
These are the minimum system requirements. Actual requirements will vary depending on the nature of your environment. McAfee Data Center Security Suite for Databases includes the following products.
McAfee Database Activity Monitoring/McAfee Virtual Patching for Databases
Standalone Management Server Operating System
- 2 GB RAM
- 1 GB free disk space
- Microsoft Windows 2008 or Microsoft Windows 2008 R2 or Microsoft Windows 2012, Microsoft Windows 2012 R2 or Microsoft Windows 2016 or Red Hat Linux 4.0 and later, or SUSE Linux 10.0 and later, or CentOS 4 and later
Backend Database
- 2 GB RAM
- 1 GB free disk space
- Microsoft SQL Server 2008 up to 2014, or Oracle 11g and later
Browser (for management access)
- Firefox 2.0 and later
- Microsoft Internet Explorer 7.0 and later
- Chrome
McAfee ePO Management
- ePO 5.0 and later
- McAfee Agent 4.8 with SP2 and later
Supported Databases for Monitoring
- Oracle version 8.1.7 and later, running on Sun Solaris, IBM AIX, Linux, HP-UX, Microsoft Windows, including Oracle RAC and Oracle Exadata
- Microsoft SQL 2000 and later on any supported Windows platform
- IBM DB2 LUW 9.5, and later
- Sybase ASE 12.5 and later on all supported platforms
- Teradata 12, 13, 13.10, 14,15, and 15.1 on Linux
- MySQL 5.1, 5.5, 5.6 and 5.7 on Linux
- MariaDB version 5.5 (5.5.32 and later), 10.0 and 10.1 on Linux
- IBM DB2 for Z/OS with CorreLog
- IBM DB2 for iSeries (AS/400) with Raz-Lee
- SAP HANA SPS 09, Revision 91 and later
- PostgreSQL 9.2 and later on Linux
McAfee Vulnerability Manager for Databases
Protect your network databases
Find potential database security weaknesses
McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses.
Find common database security issues
Identify weak passwords, default accounts, and other common threats.
Scan for a wide range of vulnerabilities
Conduct more than 4,700 vulnerability checks against leading database systems, including Oracle, SQL Server, DB2, and MySQL.
Get out-of-the-box and custom compliance reports
View reports for PCI DSS and other regulations, as well as specific reports for stakeholders such as database administrators (DBAs), developers, and InfoSec users.
Centralize security management
McAfee Vulnerability Manager for Databases is managed with McAfee ePolicy Orchestrator, providing centralized reporting and summary information for thousands of databases.
Wider visibility with a single platform
Get unparalleled visibility into your database security posture
Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network.
Gain access to thousands of security verifications
Get comprehensive and up-to-date checks of the most popular database platforms and reporting on meaningful criteria such as version/patch level, changed objects, modified privileges, and forensic traces from common hacker tools.
Check passwords quickly and efficiently
Use a variety of techniques to detect weak and shared passwords, including hashed passwords such as SHA-1, MD5, and DES, by downloading data for local analysis to avoid affecting database performance.
System requirements
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
Platform Support
Standalone Management Server Operating System
- 2 GB RAM
- 1 GB free disk space
- Microsoft Windows Server 2003 with Service Pack 2 (SP2) and later, or RedHat/Centos 5 and later
Backend Database
- 2 GB RAM
- 1 GB free disk space
- Microsoft SQL Server 2005 with SP1 and later, or Oracle 9i and later
Browser (for management access)
- Firefox 2.0 and later
- Microsoft Internet Explorer 7.0 and later
- Chrome
McAfee ePO Management
- ePO 5.0 and later
- McAfee Agent 4.8 with SP2 and later
Supported Databases for Scanning
- Oracle 8i or later
- Microsoft SQL Server 2000 or later
- Microsoft SQL Azure
- IBM DB2 8.1 or later for Linux, Unix, and Windows
- MySQL version 4.0 or later
- PostgreSQL version 8.3 or later
- Sybase ASE version 12.5 or later
- SAP HANA v1 and later
- Teradata v12, v13, v14 — Database discovery, sensitive data discovery, custom checks, and password cracking
- Informix v10.0, v11.1, v11.5, v11.7 — Database discovery, sensitive data discovery and custom checks
McAfee Application Control
Centrally managed whitelisting
Fast, flexible, and scalable protection against zero-day and advanced persistent threats
McAfee Application Control blocks unauthorized executables on servers, corporate desktops, and fixed-function devices.
Block threats without list management or signature updates
Save time and lower costs using a dynamic trust model, local and global reputation intelligence, real-time behavioral analytics, and auto-immunization of endpoints.
Stop unwanted applications
Block executable files, libraries, drivers, Java apps, ActiveX controls, scripts, and specialty code.
Protect fixed-function, legacy systems, and modern IT investments
Safeguard older operating systems, such as Microsoft Windows NT, 2000, and XP as well as recent operating systems such as Microsoft Windows 10.
Reduce patch cycles and protect memory
Maintain regular patch cycles and prevent whitelisted applications from being exploited via memory buffer overflow attacks on Windows 32- and 64-bit systems.
Thwart threats with intelligent whitelisting
Reduce risks from unauthorized applications and code
Know the reputation of every file and application in your environment and categorize them as good, bad, and unknown with real-time McAfee Global Threat Intelligence combined with local intelligence from McAfee Threat Intelligence Exchange, an optional module sold separately.
Leverage three whitelisting options
Default Deny allows software execution based on an approved whitelist or authorization by trusted channels. Detect and Deny allows software execution through signature-less reputation verification, and Verify and Deny allows the execution of applications that are verified by sandbox testing.
Balance protection and performance
Additional detection engines, including signatures, reputation, and real-time emulation, reduce the number of files requiring more resource-intensive malware sandbox analysis.
System requirements
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
McAfee Change Control
Prevent unauthorized changes while automating compliance controls
Centralized change detection and management
McAfee Change Control eliminates change activity in server environments that can lead to security breaches, data loss, and outages.
Get instant alerts to changes
Protect critical system, configuration, and content files across distributed and remote locations by enabling instant change detection and sophisticated alerting mechanisms.
Meet regulatory compliance requirements
Fulfill PCI DSS regulation requirements and eliminate manual and resource-intensive compliance policies.
Protect critical applications
Prevent tampering with critical files and registry keys.
Keep servers up and running
Prevent change-related outages and delays.
Maintain compliance with minimal performance impact
Implement continuous file integrity monitoring
Comply with PCI DSS requirements with Change Control File Integrity Monitoring (FIM) software, continuously track changes to file and registry keys, and identify who made changes to specific files.
Block unwanted changes in your server environment
Protect critical system files, directories, and configurations from tampering with the included Change Prevention software. No changes to the server environment are permitted except those in accordance with set policies.
Leverage a small footprint and minimal operational overhead
Enjoy negligible impact on server performance with low memory usage, no file scanning to affect system performance, and easy-to-set-up software.
System requirements
These are minimum system requirements only. Actual requirements will vary depending on the nature of your environment.
Platform Support
Microsoft Windows
- Embedded: XPE, 7E, WEPOS, POS Ready 2009, WES 2009, 8 Industry, 8.1
- Server: 2008, 2008 R2, 2012, 2012 R2
- Desktop: Vista, 7, 8, 8.1
AIX
- AIX 6.1, 7.1
Linux
- RHEL/CentOS 5, 6
- SUSE/openSUSE 10, 11
- OEL 5, 6
- Ubuntu 12.04
McAfee Host Intrusion Prevention for Server
Proactive, zero-day protection for servers
Defend against known and new zero-day attacks
McAfee Host Intrusion Prevention for Server boosts server security and lowers costs by reducing the frequency and urgency of patching.
Secure against malicious attacks
Leverage powerful behavioral and signature analysis, plus a dynamic stateful firewall supported by cloud-based McAfee Global Threat Intelligence, to block emerging attacks in real time.
Free up IT resources
Protect against exploits that target new vulnerabilities, so your IT staff has more time for planning, testing, and deploying patches.
Maintain server uptime
McAfee Host Intrusion Prevention for Server includes specialized protection for web and database servers.
Save time and cut costs
Protect and manage servers across your entire enterprise with McAfee ePolicy Orchestrator, a scalable and centralized management platform.
Protection beyond the endpoint
Keep your business running smoothly
Prevent intrusions, protect assets, and enforce intrusion prevention system (IPS) and zero-day threat protection coverage at all levels: network, endpoint, and application.
Customize protection
Maintain system uptime and productivity with specialized protection that secures critical servers against attacks, including directory traversal and SQL injection attacks.
Prove compliance without headaches
Use easy-to-understand and actionable views, workflows, event monitoring, and reporting to quickly remediate threats and maintain compliance.
System requirements
These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.
Platform Support
Operating Systems
- Microsoft Windows (English, French, German, Japanese, Korean, Spanish, traditional Chinese)
- Microsoft Windows Server 2008 (32-bit and 64-bit)
- Microsoft Windows Server 2003 Standard with Service Pack 2 (SP2) or higher (32-bit and 64-bit)
- Microsoft Windows Server 2003 R2 Standard (32-bit and 64-bit)
- Microsoft Windows Server 2003 Enterprise with SP2 or higher (32-bit and 64-bit)
- Microsoft Windows Server 2003 R2 Enterprise (32-bit and 64-bit)
- Microsoft Windows Server 2003 Web with SP1 or higher
- Microsoft Windows Server 2003 R2 Web
- Microsoft Windows Server 2000 Advanced Server with SP4 or higher
- Microsoft Windows Server 2000 Datacenter Server with SP4 or higher
- Microsoft Windows Server 2000 Professional with SP4 or higher
- Microsoft Windows Server 2000 Server with SP4 or higher
- Red Hat Enterprise Linux 4.0 (32-bit); kernel modules supported:
- 2.6.9-42.EL
- 2.6.9-42.EL-smp
- 2.6.9-34.EL
- 2.6.9-34.EL-smp
- 2.6.9-22.EL
- 2.6.9-22.EL-smp
- Sun Solaris
- SPARC Solaris 10
- SPARC Solaris 9 (32-bit or 64-bit kernel)
- SPARC Solaris 8 (32-bit or 64-bit kernel)
- SUSE Linux Enterprise 10, 11 (32-bit or 64-bit kernel)
Supported Web Server Platforms
- IIS 4.0, 5.0, and 6.0 (Microsoft Windows)
- Apache Web Server 2.0.42 or higher
- Apache Web Server 1.3.6 or higher
- Sun Java Web Server 6.1
- Sun ONE Web Server 6.0
Supported Database Server Platforms
- Microsoft SQL Server 2005 and 2008