Feeds

Compuware aims to catch insiders

Staff still the big security weakpoint

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

It is a sad, if well-known fact that the majority of security breaches in any business are the work of insiders. This is as true for IT security breaches as any other area, and finding out what has happened and who did it can be a tricky problem.

One answer is to be able to audit the activity of trusted users within a business, so it becomes possible to track not only who has had access to what application, but also what activities took place. This is the goal of the Application Auditing solution from Compuware, which is capable of providing detailed forensic information and audit reports. The toolset is based on the company’s Hiperstation mainframe security system, which is directly integrated with the mainframe operating system. Heavy transaction loads can be accommodated in this way, with some Hiperstation claimed to have recorded more than eight million transactions per day.

The system can have a wide range of uses, such as tracking users’ common work practices with applications so that workflow and operation can be improved. It is the security context, however, that is the primary target, and here it can provide indisputable proof of user actions that can be used to detect events that range from finding operational problems through to serious policy violations. In this context, it then gives the evidence needed to prevent incidents from becoming larger by catching up with the miscreants more quickly.

The company has indicated that, prior to the formalization of Application Auditing as an offering some of the tools have already been used to provide audit-based evidence in legal proceedings. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Preview redux: Microsoft ships new Windows 10 build with 7,000 changes
Latest bleeding-edge bits borrow Action Center from Windows Phone
Google opens Inbox – email for people too thick to handle email
Print this article out and give it to someone tech-y if you get stuck
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
UNIX greybeards threaten Debian fork over systemd plan
'Veteran Unix Admins' fear desktop emphasis is betraying open source
Google+ goes TITSUP. But WHO knew? How long? Anyone ... Hello ...
Wobbly Gmail, Contacts, Calendar on the other hand ...
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Redmond top man Satya Nadella: 'Microsoft LOVES Linux'
Open-source 'love' fairly runneth over at cloud event
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.