LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
What is the most challenging Sarbanes-Oxley issue facing Enterprises today? Print E-mail
User Rating:      How can I rate this item?
Source: Nerys Grivolas - Posted by Benjamin D. Thomas   
Network Security Companies are now finding that log management is a cornerstone best practice in their compliance efforts. Sarbanes-Oxley 404 Internal IT Control requirements infer rigorous end-to-end Log Management and Archival. Net Report helps companies face this issue.

What is the most challenging Sarbanes-Oxley issue facing Enterprises today?
Nerys GRIVOLAS, Regulatory Consultant at Net Report SAS

How to ensure end-to-end log lifecycle management to ensure secure audit trails…

Montpellier, France, October 5, 2005, Net Report SAS. Companies are now finding that log management is a cornerstone best practice in their compliance efforts. Sarbanes-Oxley 404 Internal IT Control requirements infer rigorous end-to-end Log Management and Archival. Driven by compliance, security and risk mitigation, enterprises of all kinds are standardizing and automating their log management processes – from storage and reporting to proactive alerting on security and other issues. The automation, search and analysis of all this data can be characterized as ‘log intelligence’ for executives, and provides compliance conformance and risk mitigation for an enterprise.

A combination of compliance and risk mitigation needs are driving these industries away from disparate, homegrown log management, or niche security event management. The new challenge is about capturing all logs, from any device, and then systematically storing, analysing, reporting and alerting about them in seconds.

The market's move towards industry standard log data management, storage and reporting, and the global adoption of these technologies to address compliance and risk mitigation is an enormous opportunity for Net Report and a keystone to meeting the challenge facing companies seeking Sarbanes-Oxley compliance.

Net Report’s Solution to meeting the challenge for Compliance, Risk Mitigation & Business Continuity A veritable Business Solution, Net Report's solutions meet every angle of your log exploitation issues. Net Report comprehensively covers the entirety of a business's needs in the following realms:

  • Reporting.
  • Providing a Dynamic Security and Activity Dashboard.
  • Archiving your Information Security data.
  • Centralizing Logs.
  • Correlating events and sending real-time alerts.
  • International Regulatory Conformity.

Net Report Monitoring Center Version 4.0 Net Report has recently announced the coming release of Net Report Monitoring Center Version 4.0 scheduled for early October 2005. Click the link below for more information: http://www.net-report.net/us/OurNews/News-Net-Report-Monitoring-Center-V4.htm. This new version delivers high-performance data log capture, long-term storage, dashboard reporting and alerts. A unique real-time log data collection and analysis solution. Net Report captures all log data from almost any security device or application, archives it (for over seven years and more), ensuring that companies have all the information needed for an audit or investigation. Net Report’s Solution provides a simple, automated solution for secure, long-term log data retention - automating compliance requirements. Net Report is easy-to-install, standards-based, and fully scalable, enabling companies to deploy immediate log analysis capabilities across a globally distributed network.

Net Report’s Regulatory Consulting Net Report helps companies meet the requirements in the Sarbanes-Oxley Act sections 302, 401, 404, 409, 802, 1102. Net Report is mapped from an IT Internal Control Compliance optic with the following standards frameworks PCAOB (Auditing Standards II), SEC 1934, the Turnbull Report published by the Institute of Chartered Accountants in England & Wales, COSO, COBIT, ISO 17799. Net Report offers Regulatory Consultancy to help companies become aware of the regulatory environment surrounding Sarbanes-Oxley along with the issues for those European Companies seeking compliance with other regulations such as Basel II and the Loi de Sécurité Financière (LSF). Click the link below for more information: http://www.net-report.net/us/OurPartners/Net-Report-Regulatory-Training.htm

About Net Report

Net Report, a log intelligence leader, provides enterprise-class log lifecycle management platform for high-performance log data archival, aggregation, analysis, reporting and alerting. With this highly-scalable and easy-to-install platform, Net Report addresses the compliance, risk mitigation, security, and business continuity needs of the most demanding enterprises. For more information, please visit http://www.net-report.net

Contact
Mrs Nerys Grivolas
Regulatory Consultant, Net Report SAS
e-mail nerys@netreport.fr
Tel: +33 (0)46 784 4800
Fax: +33 (0)46 784 4811

Read this full article at Nerys Grivolas

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Home router security holes to be exposed at Def Con 22 hacker meet up
Edward Snowden Calls on Hackers to Help Whistleblowers Leak More Secrets
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.