Major upgrade to leading IT auditing platform enhances control over security configuration management and data access governance across the entire IT infrastructure
Netwrix today announced the release of Netwrix Auditor VEGA, a major upgrade to its leading change and configuration auditing platform that will change the way organisations find and access audit data for investigating security incidents and passing compliance audits.
Netwrix Auditor provides complete visibility into both security configuration and data access across the entire IT infrastructure, providing actionable audit data about who did what, when and where and who has access to what. Netwrix Auditor [1] helps prevent insider-caused security breaches, pass compliance audits, minimise compliance costs and keep tabs on what privileged users are doing in the environment and why.
Key features of Netwrix Auditor VEGA include INTERACTIVE SEARCH, to quickly find exactly who changed what, when and where and who has access to what in the IT infrastructure. DELEGATED ACCESS allows key stakeholders to access audit data whenever they need it, while the new Netwrix Auditor client can be installed on any computer to provide full access to actionable intelligence. In addition, OUT-OF-THE-BOX COMPLIANCE REPORTS mapped to specific regulatory compliance standards – including PCI DSS 3.0, ISO, HIPAA, SOX and FISMA/NIST – help to pass compliance audits and minimise compliance costs.
“Once the attacker has proliferated in your corporate network, you just need to have visibility into what is happening with your IT systems, what security settings are being changed, what sensitive data is being accessed, and how to stop the attack before it spreads further,” said Michael Fimin, CEO and co-founder of Netwrix. “We live in the age of cyberwars, when complete visibility into your IT infrastructure becomes a critical weapon to win. Netwrix Auditor VEGA provides this much-needed insight, allowing you to navigate through complex audit data and ensuring a timely response to security threats.”
“We need pervasive and true visibility into our enterprise environments,” said Amit Yoran, president of RSA, in his speech “Escaping Security’s Dark Ages” at the 2015 RSA Conference in San Francisco._ “You simply can’t do security today without the visibility of both continuous full-packet capture and end-point compromise assessment visibility. Within our digital environments we need to know exactly which systems are communicating with which, why, how, any related communications, their length, frequency, volume and ultimately the content itself to determine what exactly is happening.”
“Back in the Middle Ages, when cities were fortresses surrounded by walls, the citizens could protect their strongholds only as long as knights were able to guard the walls and repel the sieges_,” continued Fimin. “Modern warfare has changed entirely and cities and countries are too vast to be surrounded by walls. Similar changes have happened to modern IT security; remote employees, cloud computing, BYOD and other modern factors have eliminated the concept of walls and weakened traditional perimeter security mechanisms. Firewalls and endpoint hardening can no longer safeguard organisations against emerging security threats and data breaches.”
For more information, please visit: www.netwrix.com [2]
Find out more about Netwrix Auditor VEGA and meet Netwrix team at Infosecurity Europe Conference & Exhibition [3] at stand #C260 in London Olympia, June 2-4, 2015.
ABOUT NETWRIX CORPORATION
Netwrix Corporation, the #1 provider of change and configuration auditing solutions, delivers complete visibility into who did what, when, and where across the entire IT infrastructure. This strengthens security, streamlines compliance, and optimizes operations. Founded in 2006, Netwrix is named on the Inc. 5000 list and Deloitte Technology Fast 500. Netwrix software is used by 160,000 users worldwide. For more information, visit www.netwrix.com
Links:
[1] http://www.netwrix.com/auditor
[2] http://www.netwrix.com
[3] http://www.netwrix.com/events.
[4] http://www.prpr.co.uk/
[5]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.