STEALTHbits Technologies, Inc © 2019
Identify Threats. Secure Data. Reduce Risk.

Challenges with Relying on Native File System Logging

An organization’s ability to efficiently and effectively capture file level access is paramount in order to not only proactively prevent data breaches or attacks, but to respond in the event your data has already been compromised. Often times, we focus on this concept of a cybercriminal external to your organization, but according to the 2018 Verizon Data Breach Incident Report, almost 1 in 5 breaches were due to user error. Regardless of how the compromise occurs, the forensic trail of "who did what and when?" can provide early signs of a compromise to security.
 
The focal point of this audit trail is data - the data that users are interacting with which also happens to be the data that attackers are after. With an estimated 80% of this data residing in unstructured data repositories, organizations struggle to maintain visibility over data access, and even the data itself.  Large enterprises typically end up with several flavors of unstructured data, including varieties of file systems, document management systems, and blob storage solutions like SharePoint, which ultimately complicates matters further, forcing the security folks to govern each of these systems in a slightly different way. 
 
In this webinar, Farrah Vijayan, STEALTHbits Director, Technical Product Management, will:

 

  • Take a deep dive into leveraging the native auditing technology for some of the most common file server platforms, including Windows, Netapp C-Mode, and EMC Isilon.

  • Explore some of the unilateral challenges faced when attempting to leverage native auditing functionality.

LinkedIn
Twitter
YouTube

Register Now

Date: Thursday, March 28th
Time: 11:00 AM ET
Duration: 45 minutes

Presenter:

STEALTHbits Technologies

Live Webinar

Farrah Vijayan
Technical Product Management

STEALTHbits Technologies