MktgRefURL  
ME-Source  
ProductSource  
LS-Souce  

担心IT安全审核和合规性?

我们全面的审计工具套件使您能够获得广泛的报表和告警功能,这些功能可以帮助保护您的企业并满足合规性要求。只需选择您要寻找的功能,我们的技术顾问将根据您的要求安排专属的个性化演示

合规管理

我们的解决方案提供预配置报表,有助于满足各种合规性法规的要求。报表可以与告警相关联,以确保您收到安全威胁的通知。这样,您可以轻松地在企业中实施安全措施,并向审计员提供与这些控制相关的数据。

1.部门
2.合规

SIEM(安全信息和事件管理)

选择您要执行的活动。

  • Collect, correlate and archive event log data from your Windows devices with a wide range of predefined reports and alert profiles to easily track critical system events, application crashes, and more.
  • Audit log data from network devices including firewalls, routers, switches, IDS/IPS and be alerted for events that pose a threat to the security of your network.
  • Analyze syslogs generated by Unix devices in real time with predefined reports and alert profiles that allow you to monitor system events, account changes, sudo command executions, and more.
  • Secure confidential data stored in SQL and Oracle databases by monitoring important events such as DML and DDL changes, user account and server activity.
  • Secure your Active Directory infrastructure by receiving real time alerts for critical events such as security group membership changes.
  • Boost application security measures by auditing usage trend and errors occurring on IIS and Apache web servers.
  • Easily track successful and failed account logons. Find out which accounts have the most failed logons, the ones that have been locked out, and the reason for the lockout.
  • Track important events occurring in your Office 365 environment such as user logon/logoffs, inactive users, malicious email spam, and more with predefined reports and alerts.
  • Keep internal threats under check by tracking every logon, access and action performed by privileged users. Monitor user session activity on the network to detect anomalies.
  • Combat cyber attacks by detecting malicious traffic in your network with a built-in STIX/TAXII feeds processor and augmented global threat IP database.
  • Secure confidential data with file integrity monitoring. Know who made the change, which object was changed, when the change was made, and what the changed value is.
  • Detect and thwart the proliferation of ransomware on Windows file servers and proactively mitigate the attack by shutting down the affected systems.