NetIQ Releases Change Guardian 4.0

By

NetIQ announces the release of Change Guardian 4.0, the company’s privileged-user activity and change-monitoring solution.

According to the announcement, Change Guardian 4.0 “detects and responds to potential threats in real time through intelligent alerting of unauthorized access and changes to critical files, systems, and applications.” Change Guardian extends security information and event management (SIEM) by delivering “actionable intelligence” on system changes, allowing admins to quickly identify and respond to attacks. The solution provides detailed information on system changes, including what action was performed, who performed the action, when and where the action was performed, and whether the action was authorized.

Change Guardian 4.0 includes “before and after” information about changes to critical files and settings and offers policy-based monitoring required for compliance with various regulations and best practices. It also provides platform support for Unix and Linux to complement existing Windows and Active Directory capabilities.

The NetIQ Change Guardian change-monitoring solution helps companies demonstrate compliance through its policy-based change auditing and automated alerting and reporting capabilities. It centrally records and audits changes, consolidating change events to help reduce the complexity of analyzing multiple logs.

For more information visit NetIQ about Change Guardian, along with other NetIQ security products.

04/11/2013

Related content

  • Intrusion Detection with OSSEC
    The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file integrity checks, Windows registry monitoring, and rootkit detection. It can be deployed virtually anywhere and supports the Linux, Windows, and macOS platforms.
  • Protect Hyper-V with on-board resources
    With the right settings and small tools, security in virtual environments can be increased significantly by tweaking the on-board tools.
  • Stopping SQL Injection

    SQL injection can strike at any moment. GreenSQL is an effective remedy that sits between the database and application and filters out suspicious queries.

  • Blocking SQL injections with GreenSQL
    SQL injection can strike at any moment. GreenSQL is an effective remedy that sits between the database and application and filters out suspicious queries.
  • Getting Ready for the New Ceph Object Store

    The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph v10.2.x, Jewel.

comments powered by Disqus