Perimeter
10/5/2009
12:57 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Guardium Safeguards McAfee.com, Automates PCI Compliance Controls

McAfee is expanding its Guardium implementation to protect its SAP systems for Sarbanes-Oxley (SOX) compliance

WALTHAM, MA " October 1, 2009 - Guardium, the database security company, today announced that McAfee has successfully deployed Guardium's real-time database security and monitoring solution to safeguard sensitive cardholder data in its high-volume, business-critical McAfee.com environment.

McAfee.com processes millions of credit card transactions per year for McAfee's online stores, serving home, home office and small business consumers. The site also serves customers of McAfee's national ISP partners such as Comcast and Cox Communications, who have strict Service Level Agreements (SLAs). It is hosted in multiple world-class, geo-separated data centers hosting large-scale, clustered database systems.

"McAfee needed a solution with continuous real-time visibility into all sensitive cardholder data " in order to quickly spot unauthorized activity and comply with the Payment Card Industry Data Security Standard (PCI DSS) " but given our significant transaction volumes, performance and reliability considerations were crucial," said Tony Gunn, director of security engineering, McAfee. "We were initially using a database auditing solution that collected information from native DBMS logs and stored it in an audit repository, but granular logging significantly impacted our database servers and the audit repository was simply unable to handle the massive transaction volume generated by our McAfee.com environment.

The Guardium solution provided enterprise-class scalability in a solution and was deployed in less than 48 hours. In addition to safeguarding our customers' trust, Guardium's technology also automates our PCI database controls and reduces DBA workload while enforcing separation of duties to protect against both internal and external threats."

McAfee is now expanding its Guardium implementation to protect its SAP systems for Sarbanes-Oxley (SOX) compliance, as well as to safeguard other sensitive financial databases in the corporation. The company is also integrating Guardium with its correlation engine and enterprise-wide Security Information and Event Management (SIEM) platform to consolidate database security alerts and events into a single console.

Guardium's scalable platform uses centralized, cross-DBMS policies to immediately identify unauthorized or suspicious activities in real-time, without relying on database-resident logs that add overhead and can easily be disabled or modified by hackers or privileged insiders employing anti-forensic tactics. Guardium is a founding member of the McAfee Security Innovation Alliance, and its Guardium 7 platform has been integrated with McAfee ePolicy Orchestrator' (ePO) and has been awarded the "McAfee compatible" designation. SIA is a core element of McAfee's technology partner ecosystem, and was established in 2007 to increase the customer value of McAfee Security Risk Management (SRM) solutions.

Forrester Research named Guardium "a Leader across the board" in enterprise database auditing and real-time protection, with Guardium earning the #1 scores for Architecture, Current Offering and Product Strategy.

"We're very pleased that McAfee, the world's largest dedicated security technology provider, has selected Guardium to safeguard their brand and consumers' trust," said Ram Metser, Guardium CEO. "Safeguarding enterprise databases is a critical task which requires the right architecture and a robust solution derived from ongoing feedback from the most demanding data center environments worldwide. Guardium is committed to providing practical solutions that safeguard our customers' businesses while at the same time simplifying database security and compliance for their IT organizations."

Guardium will be a sponsor at next week's McAfee FOCUS event in Las Vegas.

"The Forrester Wave: Enterprise Database Auditing And Real-Time Protection, Q4 2007," October 2007

About Guardium Guardium, the database security company, delivers the most widely-used solution for ensuring the integrity of enterprise data and preventing information leaks from the data center.

The company's enterprise security platform is now installed in more than 450 data centers worldwide, including 5 of the top 5 banks; 3 of the top 5 insurers; top government agencies; 2 of the top 3 retailers; 15 of the world's top telcos; 2 of the world's favorite beverage brands; the most recognized name in PCs; a top 3 auto maker; a top 3 aerospace company; and a leading supplier of business intelligence software.

Guardium has partnerships with Accenture, ArcSight, BMC, EMC/RSA, IBM, McAfee, Microsoft, Oracle, Sybase and Teradata, with Cisco as a strategic investor, and is a member of IBM's prestigious Data Governance Council and the PCI Security Standards Council.

Founded in 2002, Guardium was the first company to address the core data security gap by delivering a scalable, cross-DBMS enterprise platform that both protects databases in real-time and automates the entire compliance auditing process.

Guardium and "Safeguarding Databases" are trademarks of Guardium, Inc.

Media Contacts: Corinne Federici and George Robertson Corporate Ink 617.969.9192 cfederici@corporateink.com groberston@corporateink.com

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5619
Published: 2014-09-29
The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file system entries in FAT file systems and other file systems for which . is not a reserved name, which allows local users to hide activities it more difficult to conduct forensics activities, as demonstrated by Flame.

CVE-2012-5621
Published: 2014-09-29
lib/engine/components/opal/opal-call.cpp in ekiga before 4.0.0 allows remote attackers to cause a denial of service (crash) via an OPAL connection with a party name that contains invalid UTF-8 strings.

CVE-2012-6107
Published: 2014-09-29
Apache Axis2/C does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-6110
Published: 2014-09-29
bcron-exec in bcron before 0.10 does not close file descriptors associated with temporary files when running a cron job, which allows local users to modify job files and send spam messages by accessing an open file descriptor.

CVE-2013-1874
Published: 2014-09-29
Untrusted search path vulnerability in csi in Chicken before 4.8.2 allows local users to execute arbitrary code via a Trojan horse .csirc in the current working directory.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.