File Integrity Monitoring White Papers
Read the latest white papers from industry experts New Net Technologies. We provide comprehensive information on IT security and compliance.
The ways in which File Integrity Monitoring can strengthen your security are threefold – through system hardening, malware protection, and change management. Click on a link below to find out more about how firewalls, servers, databases, servers and anti-virus programs can protect your IT systems.
Some of us will need therapy during and after an audit - that’s not unusual - but can a Compliance Audit really bring about the same feelings as other forms of grief? Furthermore, if this really is the case then, by extension, could we coach ourselves through the compliance audit process to become more effective at dealing with future audit situations?
The visibility of configuration changes provided by traditional ‘Tripwire®-style’ file integrity monitoring may provide a great solution for breach detection and security governance, but in the past, this has come at a price.
Changes need to be reviewed and approved and to do this properly has always been a labour-intensive task.
Although FIM or File-Integrity Monitoring is only mentioned specifically in two sub-requirements of the PCI DSS (10.5.5 and 11.5), it is actually one of the more important measures in securing business systems from card data theft.
Has there ever been a more confusion-generating initiative than the PCI DSS? Even now, a good seven years on from its initial introduction, a clear and definitive understanding of what your organization needs to do may still be a challenge.