Security & Auditing

Infrastructure Monitoring and Management: How Monitoring KPIs are Helping You to Improve the Infrastructure Management

No comments

In any enterprise, IT or otherwise, infrastructure monitoring and management are extremely crucial. A drop in performance or a failure of a machine can lead to significant delays. For that reason, there’s a constant need for eyes on the overall infrastructure to ensure smooth operations. 

One of the best ways to gauge the overall health of infrastructure is by monitoring key performance indicators (KPI). It’s an extension of the different types of system and security monitoring operations that can basically give an executive summary of how the overall infrastructure is doing. It can also make it easier for management to make important decisions. 

Antonia ShehovaInfrastructure Monitoring and Management: How Monitoring KPIs are Helping You to Improve the Infrastructure Management
read more

What is Forensic Analysis and Why is it Important for the Security of Your Infrastructure

No comments

With the advent of cybercrime in recent years, tracking malicious online activities has become imperative for protecting operations in national security, public safety, law and government enforcement along with protecting private citizens. Consequently, the field of computer forensics is growing, now that legal entities and law enforcement has realized the value IT professionals can deliver.

Antonia ShehovaWhat is Forensic Analysis and Why is it Important for the Security of Your Infrastructure
read more

Measures to be Taken Against Insider Threats

No comments

Insider threats are becoming a growing concern across different industries. Most coverage goes to outside attacks, especially when it comes to big corporations and government agencies. However, internal security is something organizations need to take very seriously to avoid irreparable damages. 

Not many enterprises can afford internal threat detection programs. However, they can definitely adopt proactive measures to avoid them, especially when it comes to sensitive systems and data. And this is not something exclusive to network security companies or government agencies, any organization can fall victim to an insider attack or leak. 

Olga BurnaevaMeasures to be Taken Against Insider Threats
read more

Security risks of monitoring services: Why to always use a read-only solution

No comments

In the mid of December, SolarWinds disclosed that the company experienced a highly sophisticated, manual supply chain attack on versions of the Orion network monitoring product released in March – June 2020. The company shared that the attack was most likely conducted by foreign hackers and intended to be narrow, remarkably targeted, and manually executed attack. A FireEye blog post states that hackers managed to gain access to a huge number of public and private organizations through trojanized updates to SolarWinds’ Orion software. And during the next weeks, it was revealed that among the victims are highly reputable companies and institutions like Microsoft, the US Treasury Department, and the US Department of Commerce’s National Telecommunications. Even Google was suspected to be among the victims, which, to this day is still denied by the industry leader. 

Olga BurnaevaSecurity risks of monitoring services: Why to always use a read-only solution
read more

Event Log Management and Monitoring

No comments

Computer networks all around the world generate daily records of events occurring in their system. Some events are routine while others indicate potential security breaches or weak network health. Event log files consist of log information that can help organizations reduce their exposure against malware, intruders, damages and legal obligations. 

This useful log data has to be gathered, stored, monitored and managed by enterprises to meet regulatory compliance requirements by standards such as HIPAA, Sarbanes Oxley, GLB, Basel II, PCI DSS, FISMA and NISPOM. This can be quite a tiresome job as log files come in various formats from different sources and in large numbers. 

Your network devices and servers produce thousands of system event log entries every day. Approximately 95% of your log files record entries of all events or transactions taking place in your system, such as user logins and server crashes. When reviewing logs manually, it is highly unlikely to successfully locate a security or compliance issue.  

Olga BurnaevaEvent Log Management and Monitoring
read more