• 网络与数据中心管理
  • 服务器与应用性能管理
  • IT服务管理
  • Windows AD域管理
  • 终端管理
  • IT安全
  • MSP
  • IT运维平台
 
 
应用性能管理(APM)
保证物理、虚拟、云环境的应用性能
 
 
简化终端设备管理
全面管控PC计算机、智能手机以及平板电脑,确保网络安全
 
 
IT运维外包服务工具
多租户模式,为您的客户提供更好的服务
IT运维管理平台
统一监控、集中运维
 

Data Security & Compliance

Real-time File Integrity Monitoring for Data Security & Compliance

File Integrity Monitoring

EventLog Analyzer facilitates real time file integrity monitoring (FIM) by protecting sensitive data and meeting compliance requirements.

With EventLog Analyzer's file integrity monitoring capability, security professionals can now centrally track all changes happening to their files and folders such as when files and folders are created, accessed, viewed, deleted, modified, renamed and much more. They can even have real time alert notification upon changes occurring to their files and folders.The critical information provided by EventLog Analyzer's FIM feature allows users to make quick decisions and mitigate the risk of data breaches.

EventLog Analyzer's File Integrity Monitoring capabilities:

    PCI DSS 3.0 Whitepaper
  • Total File Integrity: Runs a thorough check on files and folders to determine if they are intact by scanning the contents, attributes, permissions, ownership, size, etc.
  • Get Real time Alerts on Critical Changes:Get instant alert notifications for critical changes occurring on the files and folders.
  • Monitors All File and Folder Types: Monitors executable files, folders, system configuration files, content files, zipped files, zipped folders, and more
  • Complete Audit Trail: Get a complete audit trail of all the changes that happen on files and folders. Audit trail answers the 'what, when, where and how' of all changes in real-time!
  • Meet Compliance Requirements: File integrity monitoring allows organizations to meet critical compliance requirements mandated by regulatory acts such as Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley (SOX), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), etc.
  • File Integrity Reporting and Scheduling:Generate exhaustive reports with precise integrity details. Reports could be generated in multiple formats such as PDF,CSV and much more. Flexible report scheduling allows you to automatically get the reports at regular intervals.
 
展开