Notícias

Estratégia de integração do Security Fabric aumentou o mercado da Fortinet, diz Tostes

O segundo trimestre da Fortinet, fabricante de soluções de cibersegurança, foi bastante positivo com a receita alcançando US$ 441,3 milhões, alta de 21% frente ao mesmo período de 2017. Para o country manager da empresa no Brasil, Frederico Tostes, o crescimento foi puxado pelo investimento no Security Fabric, uma estratégia de integração para melhorar a visibilidade de rede, o que o executivo diz ter criado uma nova forma de atuação.

Ler mais

MFD3 @ Aruba

On September 14th, 2018, Aruba hosted a Mobility Field Day livestream which brought together industry influencers and our development team in which they discussed the technologies that will become the foundation to powering and securing next-gen mobility and IoT applications.

Ler mais

Aruba Strikes Again!

After being named a leader again last month in Gartner’s Magic Quadrant for the Wired and Wireless LAN Access Infrastructure, Aruba now is highly ranked Gartner Critical Capabilities for the Wired and Wireless LAN Access Infrastructure. Aruba received the highest score in five out of the six most prevalent use cases for enterprise networking deployments, including:

Ler mais

Case de Sucesso – BIONEXO

ESTRUTURA 100% WIRELESS DA HPE ARUBA POSSIBILITA COLABORAÇÃO E AUMENTA PRODUTIVIDADE

Implementada pela Symmetry, nova arquitetura da Bionexo permite total disponibilidade de rede, Wi-Fi seguro e qualidade de conexão ao ambiente de trabalho. Saiba mais: Clique Aqui!

Aruba rolls out cloud-managed SD-branch solution

Aruba, a Hewlett Packard Enterprise company, announced its Software-Defined Branch (SD-Branch) solution, a new approach designed to help customers modernize branch networks for evolving cloud, IoT and mobility requirements.

The influx of mobile and IoT devices, greater reliance on cloud-based applications, and shrinking IT budgets are having a profound impact on IT organizations. Branch operators also face increased complexity and inefficiencies with a multiplicity of different tools for managing the network and security from different vendors.

Ler mais

Commvault ajuda clientes e parceiros a reduzir riscos e melhorar a produtividade e simplificar seus negócios, revela pesquisa

Os novos produtos simplificados colaboraram na implementação das soluções da Commvault.

A Commvault (NASDAQ: CVLT), líder mundial em backup, recuperação e arquivamento de dados em ambientes híbridos, anuncia novos cases de sucesso de clientes e parceiros sobre como a Commvault os ajudou a simplificar, reduzir riscos e aumentar a eficiência no gerenciamento de seus dados.

Ler mais

Nine Steps to better File Auditing

File auditing helps organizations secure their most sensitive data and simplifies adherence to compliance standards. When successful file auditing is in place it can help both identify a data breach as well as to potentially stop a breach.

Attackers are looking for one thing – files

Across almost all industries, file servers remain the primary asset of choice for attacks (Verizon, Data Breach Investigations Report 2017). On Windows-based networks, protected data is most likely hosted on server-based file systems, making these servers a primary target for attacks.

Organizations want to keep these files secure, only allowing access to those who need it. To both know and demonstrate that this is the case (think compliance) requires visibility into who has access, who is using access, and what actions are being taken upon the files.

‘9 steps to better file auditing’ highlights how Windows system administrators can do this best with FileAudit.

1. File auditing is more than just information

file auditing a modern user interface

Firstly, why use a third party file auditing solution? The answer lies in the gaps in functionality, performance, and detail provided by native tools.

It’s important to remember, Microsoft didn’t design Event Viewer to be an auditing solution; it was designed to simply provide IT pros a centralized application in which to view event data. So, in a scenario where a given file server needs to be audited, there are a few shortcomings.

To find out something as simple as “Who accessed your protected files today and what did they do?” requires much more work than just skimming through the event log data; it requires meticulous research into specific field values within multiple log entries, all to “puzzle piece” your way to a potential answer. It’s time-consuming and overwhelming. File auditing should be more than just about information. Look for intelligence and insight.

Read more about the shortcomings of native Windows Event Viewer for auditing file servers.

2. Get alerts to abnormalities in file activity

 Receive Alerts to Access Events

When protected data resides on a file server, obvious leading indicators of a breach will exist. By watching the access and usage of protected data on file servers, it’s possible to detect a data breach based on unusual activity. Examples include:

  • Frequency – Normal user access can likely revolve around an average daily use. The presence of a mass copying or bulk deletion or movement of data is worth looking into.
  • Amount – Are files being accessed multiple times more than is normal? An unsure insider having second thoughts about stealing data may make several access attempts before finally taking data.
  • Day/Time – A user accessing data at 10pm on Friday night who normally only accesses files Monday – Friday during business hours seems suspect.
  • Endpoint/IP Address – Access from a machine outside the company network, or one that doesn’t normally access a given set of files can be a clear sign of improper use.
  • Processes – Attackers may use their own tools to exfiltrate data, so seeing processes other than Explorer, Word, etc. accessing files can indicate a problem.

FileAudit allows you to give proper attention to what may equate to a data breach. 

For more information on how to identify unusual file activity and impede data breaches read the whitepaper The role of File Auditing to Spot and Stop a Data Breach.

3. Use powerful filtering capabilities to improve your audit

fileauditing file access filtering

Finding answers about file access activity can be time consuming and challenging. Exclude irrelevant dataand focus only on insightful and actionable information.

4. Accurately identify where file or folder access is from

file access viewer

Only by identifying the name and IP address of the machine from which the file/folder access has been performed can you indicate exactly where the user has accessed the file from. Shine a light on suspicious activities, such as a user accessing a sensitive file from a different workstation than normal.

5. Secure the whole organization, not just a single server

centralized file auditing

FileAudit provides the centralized monitoring and analysis of file activity data necessary to quickly and intelligently identify and report on potential breach activity. The ability to monitor activity across the whole organization (not just a single server) means quick and accurate answers can be given to who did what, when and from where.

6. Exclude irrelevant data & focus on insightful information

 Focus on insightful information by excluding irrelevant data

Filtering out program access events (such as backup tool, anti-virus or search engine) or files with specific extensions (e.g. temporary files with .tmp extension) stops your data becoming polluted.

Also an audit tool that discards meaningless events and keeps only the relevant access events (approx. 30% for FileAudit) for monitoring improves performance and scalability.

7. Ensure file auditing is intuitive and easy to use

File System Auditing Tutorials

Unlike native tools, which simply address the task of consolidating and presenting event data, FileAudit is purpose-built, improving the audit experience by focusing on the specific needs around compliance audits, the use of solutions by IT and auditors alike, and the detail necessary to ensure compliance.

Simple to install and easy to use It makes file auditing faster, smarter and more efficient – regardless of whether IT are working on PCs, laptops or tablets.

Watch how to install FileAudit in less than 3 minutes.

8. Use one secret to improve file security – user delegation

User Specific Rights Management

The reality is, those closest to the files have a much better sense of whether someone’s access – or use of permissions – is proper. IT are somewhat out of touch with which users need what access, and whether use of files is appropriate – and how all that changes over time.

For a Windows System domain, company executives outside of IT or external auditors can take advantage of FileAudit features and ease-of-use to perform audits and controls autonomously without breaching security protocols.

Read more about security through delegation with FileAudit.

9. Include the auditing of files in the cloud

file auditing cloud based applications

If your files aren’t already in the cloud, they will be soon.  Organizations must achieve the same levels of visibility and control over access to and usage of file data in the cloud. A single consolidated view of all file activity activity – both in the cloud and on-premise –will reduce the risk associated with allowing users anytime, anywhere, any device access to cloud-based file data.

More on how FileAudit can extend file auditing with cloud-based services.

 

File auditing need not be time-consuming or overwhelming. If managed carefully and correctly your chosen file auditing tool should do the work for you, so you can focus on more strategic IT issues and initiatives. A free trial of FileAudit is available for download.

Bitglass study finds that EMEA cloud adoption continues to outpace rest of the world

  • EMEAimage desc for 1 cloud adoption has increased to 84image desc for 2 percent; 5 in 6 companies analysedimage desc for 3 have deployed at least one cloud application
  • Officeimage desc for 4 365 continues its domination over G Suite
  • Financialimage desc for 5 services and healthcare see surge in cloud adoption rates
  • Manyimage desc for 6 organisations fail to deploy adequate cloud security

Ler mais

Aruba introduces integrated SD-WAN, LAN and security solution

Aruba, a Hewlett Packard Enterprise company, has announced its Software-Defined Branch (SD-Branch) solution, a new approach designed to help customers modernize branch networks for evolving cloud, IoT and mobility requirements.

Ler mais

Como a Internet das Coisas Vai Transformar seu Celular no seu melhor Assistente Médico e mudar os Serviços de Saúde

Na corridinha matinal seu relógio inteligente monitora seus batimentos cardíacos e a oxigenação, alimentando seu prontuário eletrônico que está na nuvem e pode ser acessado pelo seu cardiologista em tempo real. Ao chegar em casa, seu celular conectado a um sensor subcutâneo implantado no seu braço dá um alerta de que você esqueceu de tomar sua medicação. Ao usar o vaso sanitário, um teste de urina pode descobrir uma infecção ou, surpresa!, uma gravidez.

Ler mais