Section 501 of the Gramm-Leach-Bliley Act (GLBA) documents specific regulations required for financial institutions to protect "non-public personal information". As a part of the GLBA requirements, it is necessary that a security management process exists in order to protect against attempted or successful unauthorized access, use, disclosure, modification, or interference of customer records. EventLog Analyzer helps meeting this requirement of GLBA by providing predefined reports and real-time alerts on attempted or successful access to the systems, applications and devices that contain sensitive information. The solution also protects your network from both internal and external security attacks by collecting, monitoring and analyzing log data from sources across the network including OS, applications, network devices and more.
EventLog Analyzer meets the system monitoring and reporting requirements of GLBA Regulations. With EventLog Analyzer, you can easily monitor your network systems for any insider activity. GLBA regulations mandate analysis of all logs, including OS and application logs.
|
The types of reports that EventLog Analyzer provides for GLBA Audits are as follows:
- User Logon/Logoff report:
GLBA requires the security administrators to continuously monitor all the user accesses to the system and look for any possible breach. The intent of this requirement is not just to identify the breach attempt but also to document the accesses to the confidential information that is being stored. In most cases, the very fact that the accesses are recorded is deterrent enough for malicious activity, much like the presence of surveillance camera in the parking lot. EventLog Analyzer helps you to meet this requirement at an easy by continuously monitoring the system with the confidential data and by providing a detailed predefined report on all the user logon/logoffs. The solution also gives you real-time email/SMS notification upon the occurrence of any unauthorized access.
- Logon Failure report:
EventLog Analyzer provides detailed predefined reports on the logon failures happening on your network. It gives you exhaustive information such as the reasons for logon failures, user name, data, and time of logon failure ,and more. The security logon feature includes logging all unsuccessful login attempts.
- Audit Logs Access report:
One of the GLBA requirements states that you need to have a proper procedure to regularly review records of information system activity such as the audit logs. EventLog Analyzer facilitates auditing of log accesses with its predefined "Audit Logs Access Report". Also, the solution archives the log data in a secured fashion, thus enabling you to conduct audit trails/forensic analysis at any time.
|