They say that information is power. This is certainly the case when it comes to the data that traverses your distributed physical or cloud based environment on a daily basis. Employees, partners, vendors, customers and many other user communities leverage your information regularly and it is the lifeblood of the business. It is for this reason that hackers are continuously building “the better mousetrap”; to defeat your security, gain the information they want and profit by using it or selling it to the highest bidder. Even a relatively minor breach can cause irreparable harm, violate regulatory compliance and put an organization at risk. Some organizations never recover.
A leader in enterprise data protection, Vormetric protects essential structured and unstructured data with encryption access control and key management wherever it resides – in physical, virtual, cloud and big data environments. While enforcing encryption rules and data access controls in these environments, Vormetric agents collect, alert and log information that is missed by perimeter security products. It delivers new visibility to the SIEM as to who, what, when, and how files are accessed on the servers. This information on file access by users and processes, as well as potential security & compliance threats that may have bypassed perimeter defenses can now be easily visualized, tracked and alarmed.
McAfee and Vormetric’s joint solution also establishes comprehensive protections around sensitive database assets whether they are physical or cloud based. The integrated solution enables you to institute multilayer defenses, so your organization can guard against multiple threat vectors.
McAfee, Inc, part of Intel Security is an American global computer security software company headquartered in Santa Clara, California, and the world's largest dedicated security technology company. Vormetric security intelligence log data provides granular information on file-level access of sensitive data, including that of insiders, such as administrative users or malware attempting to imitate an authorized user. This log data provides rich contextual information to the McAfee ESM platform to generate compliance reports and alert on suspicious and unusual file-level access of sensitive data.
To learn more: