Security for Z – Beyond Your ESM and SIEM
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings,
SHARE Sacramento 2018,
2018
Event logging, access control and data encryption still leave information at risk while in use by application programs. Hackers with stolen credentials can implant harmful changes that steal data after it has been decrypted. Configuration members and executables are not covered by pervasive encryption.
This session shows how file integrity monitoring can compare code in use to trusted levels and any change via existing SIEM services. Regular scans can determine the interval when the tampering took place, dramatically reducing incident response time and effort. In addition, errors and omissions when promoting authorized changes can be revealed. Discover zero-day threats before severe damage can take place.-Allen Saurette-MainTegrity Inc
Back to Proceedings File Library