By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The product will help network managers to monitor both external and internal threats to system security. Consul's chief executive Koen Bouwers said, "Servers, mainframes, firewalls, intrusion detection systems and applications all store their information in different formats and often in different places. eAudit allows all of these logs to be collected and formatted into a single report that gives an overview of the entire system from a single console."
A key component of the software is the security policy, which is customised to set parameters and thresholds for specific security breaches or system anomalies that could indicate malevolent behaviour. This allows the pinpointing of individual systems within the company that persistently break these rules.
Over time, the security policy can be refined or changed as new threats and vulnerabilities appear, even if the underlying hardware has not been updated or extended.