The two change-detection applications reviewed here are designed to notice when something important changes on a system you’re monitoring. And, for the most part, they aren’t designed to protect against random acts of dumbness carried out by your employees. While intrusion-detection products promise to keep an eye on the network assets, their capabilities are limited. The reason is obvious: In addition to threats provided by ill-behaved applications, there are problems with employees installing pirated software, worms getting in, rogue employees trying to break into files they shouldn’t see, and the occasional hacker trying to create havoc. Keeping tabs on who’s doing what to the enterprise network is a crucial part of an IT manager's job.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |