Enabling Sarbanes-Oxley Security Monitoring Compliance


http://www.bitpipe.com/detail/RES/1097862548724.html

Security information management (SIM) and centralized log aggregation and consolidation solutions provide the ability to comply with Sarbanes-Oxley's security monitoring requirements. Read how combining real-time threat analysis and vulnerability management capabilities with reporting and centralized log aggregation allows organizations to reduce the risk of a successful compromise (including exploits launched internally), prove that security polices are being correctly followed, and provide an integral framework to identify threats and guide incident responses in a consistent, compliant, approved manner. The white paper also discusses how SIM can make enterprise security relevant to business operations, by aligning risk, threats and responses to the lines of business affected.

http://www.bitpipe.com/detail/RES/1097862548724.html

About the Author

Phil Hollows is responsible for marketing at Open. Prior to Open, Hollows was vice president of technology at RadView Software, a Web load testing tool vendor. At RadView, Hollows directed the evolution of product portfolio extensions focused customer market needs, developed customer support into a proven key competitive advantage and articulated the company's vision to prospects, customers and employees.