logo
  Join        Login             Stock Quote

New McAfee Database Security Solution Offers Businesses of All Sizes Complete Threat Protection

Tuesday, February 28, 2012 8:00 AM


Features New Protection for Teradata Databases, Free Database Audit Plug-in for MySQL and Ability to Manage Database Security Outside of its Own Silo

RSA CONFERENCE--McAfee today announced its new McAfee Database Activity Monitoring solution offering reliable, real-time protection for business-critical databases. The solution enables organizations to achieve much greater security management efficiency through its incorporation into the McAfee ePolicy Orchestrator centralized security management platform.

According to a 2010 Verizon Business Study, more than 90 percent of records breached involved a database, with more than 87 percent based on exploits requiring significant technical skills. The McAfee database security solution protects databases from external, internal and intra-database threats, requiring no architecture changes or costly downtime. The latest version of McAfee Database Activity Monitoring now supports MySQL and Teradata databases, in an effort to ensure complete protection across the most popular database management systems.

"Teradata worked closely with McAfee to enable their support of Teradata in the new release of McAfee Database Activity Monitoring," said Jim Browning, Enterprise Security Architect for Teradata Labs. "Companies using McAfee can now realize the power of Teradata while better monitoring user activity and enhancing the protection of their highly sensitive data."

McAfee now enables organizations to easily incorporate database security into their overall security program and realize tremendous management efficiencies with the full integration of McAfee Vulnerability Manager for Databases into the McAfee ePolicy Orchestrator console.

"Typically, three out of four organizations rely solely on the native database security features provided by their database vendor," said Slavik Markovich, chief technology officer of database security at McAfee.


Advertisement
Advertisement



Fundamental data is provided by Zacks Investment Research, and Commentary, news and Press Releases provided by YellowBrix and Quotemedia.
All information provided "as is" for informational purposes only, not intended for trading purposes or advice. iStockAnalyst.com is not an investment adviser and does not provide, endorse or review any information or data contained herein.
The blog articles are opinions by respective blogger. By using this site you are agreeing to terms and conditions posted on respective bloggers' website.
The postings/comments on the site may or may not be from reliable sources. Neither iStockAnalyst nor any of its independent providers is liable for any informational errors, incompleteness, or delays, or for any actions taken in reliance on information contained herein. You are solely responsible for the investment decisions made by you and the consequences resulting therefrom. By accessing the iStockAnalyst.com site, you agree not to redistribute the information found therein.
The sector scan is based on 15-30 minutes delayed data. The Pattern scan is based on EOD data.