NetIQ today announced the latest versions of its NetIQ Sentinel Security Information and Event Management (SIEM) and NetIQ Change Guardian privileged user activity monitoring solutions. As organizations begin to integrate more sources of identity data into their overall security and breach prevention strategies, these solutions comprehensively monitor privileged user activity to reduce the risk of data breach in an increasingly perimeter-less IT environment.
The shift away from a legacy, “perimeter-first” security approach renders most traditional ways of protecting devices, infrastructure and technology obsolete. Security teams increasingly need visibility into user activity and the context of those activities to determine if the behavior they are exhibiting is normal and appropriate or the result of breach. Now, customers using NetIQ Sentinel 7.2 will benefit from new threat intelligence feeds that help customers protect their networks and sensitive data from today’s most widely used botnets, including SpyEye and Zeus. Also new in NetIQ Sentinel 7.2 is greater NetFlow traffic analysis to help customers quickly detect malware, bad actors and investigate suspicious network traffic.
Today, the greatest exposure and risk to today’s organizations are privileged users, including non-human privileged accounts. Data compromise occurs as a result of privileged identities and accounts that are either intentionally or inadvertently used in inappropriate or nefarious ways. New features in Change Guardian 4.1 offer customers deeper integration with Active Directory (AD) identity stores and expanded file integrity monitoring (FIM) capabilities, allowing IT teams to more quickly detect threats and respond to audits faster and at a lower cost of ownership.
“NetIQ Sentinel and NetIQ Change Guardian collectively monitor the people, identities, accounts and interactions with data that ultimately predict a threat or identify a breach,” said Renee Bradshaw, Senior Solution Manager at NetIQ. “This is foundational to an Identity-Powered Security strategy. By integrating identity data to identify connections between privileged users and potentially suspicious behaviors, these solutions help security organizations cut through event noise and avoid fighting a battle on the last lines of defense – at the data level – when sensitive company data has most likely already been compromised or stolen.”
Sentinel 7.2 and Change Guardian 4.1 are generally available today worldwide and offered on a subscription or perpetual license basis. For more information please visit www.netiq.com.
No comments:
Post a Comment