File Integrity Monitoring NON STOP FILE INTEGRITY MONITORING

As attacks just keep coming, breaches seem to be almost inevitable. Now it's time to shift our focus to how we detect intrusions once the attacked have gained access.

As Mark Kedgley, CTO of New Net Technologies, explains in this interview, there is no such as 100% security- if you want to connect with the rest of the world, you open yourself to cyber attacks. You need to spot malicious activity on your network when it happens- as soon as it happens. 

File Integrity Monitoring (FIM), which registers changes done to files, is one way of going about it. But it can lead to a lot of false positives when regular and frequent legitimate changes- such as patching- take place. This can easily lead to alert fatigue. So we need to be smart about what kinds of alerts are generated, and learn what 'good' changes look like. If you operate properly locked-down configurations in your IT environment, this is possible, and it makes spotting & responding to malicious activity that much easier. 

 

 

Products
USA Offices
New Net Technologies Ltd
Naples
9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
Redbourn,
St Albans

Herts
AL3 7PR

Tel: 08456 585 005
Fax: 08456 122 031
email info@newnettechnologies.com
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.

Sign up to the NNT newsletter