There are no menu items in this menu.

Security Information & Event Management

McAfee is a leader in the Gartner Magic Quadrant for SIEM.

McAfee Enterprise Security Manager

At the core of our SIEM offering, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance. 

McAfee Advanced Correlation Engine

Deploy McAfee Advanced Correlation Engine with McAfee Enterprise Security Manager to identify and score threat events in real time using both rule- and risk-based logic. You tell McAfee Advanced Correlation Engine what you value—users or groups, applications, specific servers, or subnets—and it will alert you if the asset is threatened. 

McAfee Application Data Monitor

Advance security and compliance beyond log management by monitoring all the way to the application layer to detect fraud, data loss, and advanced threats. This SIEM tool supports accurate analysis of real application use, while enforcing policies and detecting malicious, covert traffic. 

McAfee Database Event Monitor for SIEM

Get a complete audit trail of all database activities, including queries, results, authentication activity, and privilege escalations, widening your visibility into who’s accessing your data and why. 

McAfee Enterprise Log Manager

Reduce compliance costs with automated log collection, storage, and management. Collect, compress, sign, and store all original events with a clear audit trail of activity that can’t be repudiated. 

McAfee Event Receiver

Collect up to tens of thousands of events per second with a single receiver, and use a highly indexed database to quickly retrieve data and analysis. 

McAfee Global Threat Intelligence for Enterprise Security Manager

Enhance your SIEM deployment with a constantly updated threat intelligence feed that broadens situational awareness by enabling rapid discovery of events involving communications with suspicious or malicious IPs.