logo
May 13, 2023 | Dirk Schrader

What a Baseline Configuration Is and How to Prevent Configuration Drift

Configuration drift seems inevitable — the gradual but unintentional divergence of a system’s actual configuration settings from its secure baseline configuration. Proper configuration of your infrastructure components is vital for security, compliance and business continuity, but setting...
November 18, 2022 | Dirk Schrader

FIM Solutions: Essential Guide

Changes to your IT devices, systems and servers are inevitable — but they can introduce critical security weaknesses. A file integrity monitoring (FIM) solution will track changes to your system and configuration files so you can promptly verify patch rollouts and investigate and mitigate...
August 16, 2022 | Dirk Schrader

Agentless vs. Agent-based FIM: Which One to Choose?

Malware attacks are escalating. For example, there were 57 million IoT malware attacks in the first half of 2022, a staggering 77% increase year to date. Unfortunately, traditional signature-based antivirus and sand-boxing technologies are insufficient against today’s sophisticated attacks. In...
March 17, 2022 | Dirk Schrader

File Integrity Monitoring for PCI DSS Compliance

File integrity monitoring (FIM) is essential for securing data and meeting compliance regulations. In particular, the Payment Card Industry Data Security Standard (PCI DSS) requires organizations to use FIM to help secure their business systems against card data theft by detecting changes to...
November 3, 2021 | Dirk Schrader

Integrating FIM and SIEM Solutions

As a business owner or manager, you must invest in top-notch security software to protect your critical files and other IT assets. Proactive vulnerability management and real-time threat monitoring help minimize the risk of costly data breaches and downtime. A well-crafted audit policy can help...
November 3, 2021 | Dirk Schrader

What is Windows File Integrity Monitoring?

Malicious actors can cause a lot of damage to your business, employees, and clients if they gain access to your systems. Besides stealing and leaking data, they can also change your configurations, applications, and system files — and delete logs to cover their tracks. File integrity...
April 14, 2020 | Jeff Melnick

File Integrity Monitoring: Definition, Benefits and Key Features

File integrity monitoring  is crucial for the security of an organization’s information systems, as well as for regulatory compliance. This article will explore what file integrity monitoring is and help you find the right file integrity monitoring software solution for your...
...