Security for Z – Beyond Your ESM and SIEM
				Project and Program: 
Enterprise Data Center, 
Security and Compliance
				Tags: 
Proceedings, 
SHARE Sacramento 2018, 
2018
		
		
		
			
		Event logging, access control and data encryption still leave information at risk while in use by application programs. Hackers with stolen credentials can implant harmful changes that steal data after it has been decrypted. Configuration members and executables are not covered by pervasive encryption. 
This session shows how file integrity monitoring can compare code in use to trusted levels and any change via existing SIEM services. Regular scans can determine the interval when the tampering took place, dramatically reducing incident response time and effort. In addition, errors and omissions when promoting authorized changes can be revealed. Discover zero-day threats before severe damage can take place.-Allen Saurette-MainTegrity Inc
		
		
		
		
		
		
	
 Back to Proceedings File Library