For a long time there has been a need to gather and store log files for compliance purposes. Early log management products evolved in to SIEM (security information and event management) as their scope was extended to include a broader range of events across a wide range of IT devices from the data centre, across the network to the desktop. Typically, this information was use retrospectively to prepare reports for auditors etc. More recently some of the vendors have souped up their products to enable them to act on data in real time. This enables advanced cyber security protection measures to be put in place that can identity anomalies that may be missed by point security products such as firewalls, anti-malware and data loss prevention (DPL); some are calling this next generation SIEM.
A compliance oriented IT architecture for financial services organisations
The number and complexity of regulation of the financial services industry is increasing. A big part of compliance means knowing who has done what on IT systems and that requires effective identity management. This presentation was given in Dec 2012 at an event sponsored by Centrify.