File Integrity Monitoring (FIM) Security for Z – Closing ESM and SIEM Holes
Project and Program: Enterprise Data Center
, Security and Compliance
, SHARE St. Louis 2018
Event logging, access control and data encryption still leave information at risk while in use by application programs. Hackers with stolen credentials can implant harmful changes that steal data after it has been decrypted. Configuration members and executables are not covered by pervasive encryption.
In this session you will learn how file integrity monitoring (FIM) can detect harmful changes on your system that may have bypassed your ESM access control. Shortening the intrusion detection time frame and focusing reducing incident response time and effort is critical. Mainframe FIM streamlines standard SIEM processing identifying external or internal malicious activity in a fraction of the time. Find out how to discover zero-day threats before severe damage can take place.-Allen Saurette-MainTegrity Inc
Back to Proceedings File Library