Network security monitoring
Consul Risk Management has released a new version of its eAudit software for collecting and collating information about events...



From forensic cyber to encryption: InfoSec17
Security technologist Bruce Schneier’s insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken’s comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
The product will help network managers to monitor both external and internal threats to system security. Consul's chief executive Koen Bouwers said, "Servers, mainframes, firewalls, intrusion detection systems and applications all store their information in different formats and often in different places. eAudit allows all of these logs to be collected and formatted into a single report that gives an overview of the entire system from a single console."
A key component of the software is the security policy, which is customised to set parameters and thresholds for specific security breaches or system anomalies that could indicate malevolent behaviour. This allows the pinpointing of individual systems within the company that persistently break these rules.
Over time, the security policy can be refined or changed as new threats and vulnerabilities appear, even if the underlying hardware has not been updated or extended.
Read more on IT risk management
-
Why businesses must think like criminals to protect their data
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
-
Security Think Tank: Human, procedural and technical response to fileless malware
Start the conversation
0 comments