Feeds

Compuware aims to catch insiders

Staff still the big security weakpoint

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

It is a sad, if well-known fact that the majority of security breaches in any business are the work of insiders. This is as true for IT security breaches as any other area, and finding out what has happened and who did it can be a tricky problem.

One answer is to be able to audit the activity of trusted users within a business, so it becomes possible to track not only who has had access to what application, but also what activities took place. This is the goal of the Application Auditing solution from Compuware, which is capable of providing detailed forensic information and audit reports. The toolset is based on the company’s Hiperstation mainframe security system, which is directly integrated with the mainframe operating system. Heavy transaction loads can be accommodated in this way, with some Hiperstation claimed to have recorded more than eight million transactions per day.

The system can have a wide range of uses, such as tracking users’ common work practices with applications so that workflow and operation can be improved. It is the security context, however, that is the primary target, and here it can provide indisputable proof of user actions that can be used to detect events that range from finding operational problems through to serious policy violations. In this context, it then gives the evidence needed to prevent incidents from becoming larger by catching up with the miscreants more quickly.

The company has indicated that, prior to the formalization of Application Auditing as an offering some of the tools have already been used to provide audit-based evidence in legal proceedings. ®

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.