File Integrity Monitoring NON STOP FILE INTEGRITY MONITORING

As attacks just keep coming, breaches seem to be almost inevitable. Now it's time to shift our focus to how we detect intrusions once the attacked have gained access.

As Mark Kedgley, CTO of New Net Technologies, explains in this interview, there is no such as 100% security- if you want to connect with the rest of the world, you open yourself to cyber attacks. You need to spot malicious activity on your network when it happens- as soon as it happens. 

File Integrity Monitoring (FIM), which registers changes done to files, is one way of going about it. But it can lead to a lot of false positives when regular and frequent legitimate changes- such as patching- take place. This can easily lead to alert fatigue. So we need to be smart about what kinds of alerts are generated, and learn what 'good' changes look like. If you operate properly locked-down configurations in your IT environment, this is possible, and it makes spotting & responding to malicious activity that much easier. 

 

 

NNT Products
USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email [email protected]
UK Office
New Net Technologies LLC
Rivers Lodge
West Common
Harpenden
Hertfordshire
AL5 2JN

Tel: 01582 287310
email [email protected]
Connect
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500 Sans Institute
Copyright 2017, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.