McAfee ESM icon
McAfee ESM icon

McAfee ESM

McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.

Cost / License

  • Paid
  • Proprietary

Application type

Platforms

  • Online
-
No reviews
0likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Multiple Account support
  2.  Password protection

 Tags

McAfee ESM News & Activities

Highlights All activities

Recent activities

No activities found.

McAfee ESM information

  • Developed by

    US flagMcAfee, Inc.
  • Licensing

    Proprietary and Commercial product.
  • Alternatives

    11 alternatives listed
  • Supported Languages

    • English
McAfee ESM was added to AlternativeTo by CharleyBoy on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is McAfee ESM?

McAfee Enterprise Security Manager delivers intelligent, fast, and accurate security and information (SIEM) and log management.

Real-time visibility into all activity on systems, networks, databases, and applications

McAfee Enterprise Security Manager delivers a real-time understanding of the world outside—threat data, reputation feeds, and vulnerability status—as well as a view of the systems, data, risks, and activities inside your enterprise.

As the foundation of our security information and event management (SIEM) solution, McAfee Enterprise Security Manager delivers the performance, actionable intelligence, and real-time situational awareness required for organizations to identify, understand, and respond to stealthy threats, while the embedded compliance framework simplifies compliance.

Enabling fast, risk-based decisions

Advanced threat intelligence

Get actionable information on all collected events with contextual information, such as vendor threat feeds and shared indicators of compromise (IOC), to deliver prioritized, actionable information in minutes.

Critical facts in minutes, not hours

Store billions of events and flows, keeping information available for immediate ad hoc queries, forensics, rules validation, and compliance. Access long-term event data storage to investigate attacks, search for indications of advanced persistent threats (APTs) or IOC, and remediate a failed compliance audit.

Optimize security management and operations

Centralize the view of your organization’s security posture, compliance status, and prioritized security issues that require investigation. Access hundreds of reports, views, rules, alerts, and dashboards.