Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

McAfee Releases Free Security Plug-in for MySQL Databases

In an effort to help users get a better idea of the security status of their MySQL databases, McAfee today released a free open-source audit plug-in that provides detailed database activity audits and helps satisfy audit requirements for the wildly popular open source database platform.

McAfee promises that the software-only implementation is easy to deploy and is highly scalable, and ideal for protecting and monitoring MySQL databases in the cloud, with key features including:

In an effort to help users get a better idea of the security status of their MySQL databases, McAfee today released a free open-source audit plug-in that provides detailed database activity audits and helps satisfy audit requirements for the wildly popular open source database platform.

McAfee promises that the software-only implementation is easy to deploy and is highly scalable, and ideal for protecting and monitoring MySQL databases in the cloud, with key features including:

McAfeeVisibility into database vulnerabilities: Insight into the security posture of each and every database in the environment

Real-time protection across all multiple vectors: The non- intrusive plug-in requires no changes to the existing database and network architecture and offers reliable protection for databases from malicious or unauthorized activity across all threat vectors

Compliance without downtime: Using McAfee virtual patching for databases, security updates can be made without having to take applications offline

Upcoming Event: Secure Development Conference – May 15 – 16 | Washington, DC

“McAfee developed the free database audit plug-in to give the community of MySQL users a means of building enterprise-level database security around their databases,” said Dan Sarel, vice president of Database Security Product Management at McAfee.

The free open-source MySQL audit plug-in supports such databases including Oracle, Sybase, MS-SQL and DB2.

Advertisement. Scroll to continue reading.

Users interested in downloading and testing the plug-in can get it from Github here.

Sean Roth and Slavik Markovich, both part of McAfee’s database security team, demonstrate the plug-in in a video here.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...