Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

McAfee Application Data Monitor (Formerly NitroView ADM)

The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text of an email or its attachments). This level of detail allows accurate analysis of real application use, while also enabling you to enforce application use policies and detect malicious, covert traffic.

Features

 

  • Capture full session detail of all violations
    Go beyond application flow monitoring to decode the entire application session, all the way to Layer 7.

 

  • Leverage pre-built detection rules for regulated and sensitive data
    Monitor access to and use of sensitive information such as credit card numbers, social security numbers, and bank routing numbers out of the box, or customize the McAfee Application Data Monitor appliance's detection capabilities by defining your own dictionaries of sensitive and confidential information.
  • Document a complete audit trail of application events for compliance
    Preserve all details of application sessions that violate policies for use in incident response, forensics, and compliance audits.
  • Avoid interference with application performance and latency
    Deploy Application Data Monitor as a passive SPAN port for passive monitoring, with no risk to an application's operation, performance, or reliability.
Favoured:
0

Listing Details

Vendor
McAfee (formerly NitroSecurity)
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2013-06-25
Owner
michelemjordan
Add'l Info
Detect fraud, data loss, and hidden threats with application-layer inspection
Created
2011-12-23
Tags
application data monitor, compliance, data loss prevention
  • 477.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
    • - Network Enumerators
    • - Passive Fingerprinters
    • - Active Fingerprinters
    • - Vulnerability Exploitation
    • - Network Mapping
    • - Distributed Scanners
    • - Host Scanners
    • - Website Scanners +
    • - Database Scanners
    • - Wardialers
    • - Wireless Tools
    • - Bluetooth Scanners
    • - Network Scanners
    • - Vulnerability Management
    • - Compliance +
      • - PCI DSS
      • - SOX
      • - NERC
      • - HIPAA
      • - GLBA
      • - FISMA
      • - Basel II
      • - NSA
      • - Bill 198
      • - US FDA CFR Pt 11
      • - NSSC
      • - FDCC
      • - JSOX
    • - Mobile Device Scanners
    • - Pen-Testing Distros
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message