McAfee has introduced a MySQL audit plug-in for logging activity on the open-source database.
The plug-in is available at no charge for use with the security vendor's Database Activity Monitoring sensor.
When used with the sensor, the plug-in captures data that "is subject to the same real-time analysis and policy enforcement as the data collected from other supported databases," Dan Sarel, vice president of database security product management at McAfee, said Monday in a statement.
McAfee's activity monitor locates vulnerabilities, while also providing malware intrusion protection. The software also handles patching without taking applications offline, according to McAfee.
The MySQL audit plug-in supports databases from Oracle, Sybase, Microsoft and IBM. The plug-in is available for download.
McAfee acquired its database security products a year ago with the purchase of Sentrigo. The acquisition came a few months after the launch of the vendor's Security Connected initiative.
The mission was to provide partners, developers and customers with a more comprehensive approach to security by leveraging product integration and global threat intelligence.
Sentrigo was a partner of McAfee, which sold the company's technology as the McAfee Vulnerability Manager for Databases, the McAfee Database Activity Monitoring and the McAfee Integrity Monitoring for Databases.
This article originally appeared at crn.com
Copyright © 2014 The Channel Company, LLC. All rights reserved.
Issue: 336 | March 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.