Archive for the ‘Data Security’ Category

Are you a Windows administrator in charge of the IT network of the organization? There are chances that you make mistakes on many fronts. But don’t worry. You are not alone. We here will tell you the most common mistakes that IT administrators fall prey to. 1. Not planning IT infrastructure and resources As an administrator you can ignore planning only at your own peril. You are in charge of … Read more

Security Auditing of an enterprise – whether in an extremely large organization or a smaller one is one of the most important concern pertaining to protect your confidential or private data from hackers eyes. Unauthorized file access, falsification and even deletion and modification of files & folders has become a common phenomenon in organizations where it becomes difficult to audit events, track malicious user actions & monitor illegal access.

Are you using domain administrator accounts to manage Active Directory (AD) or support end-user devices? Here are some tips and best practices to help improve security and change control. It’s a common scenario. A new employee joins the IT department, and the first task is to provide them with access, often in the form of an account with domain administrator privileges. I’ve always found it somewhat curious that organizations often … Read more

Investing in securing data at rest on servers, and over-the-wire encryption is vital, but unless the devices used to access data are also effectively secured, all other efforts might be in vain. Many organizations consider their most important IT assets to be the servers that process the data that the business couldn’t operate without, employing sophisticated defenses to provide protection, including products such as Lepide Data Security Platform. But ignoring … Read more

Well, you may think what security risk has to do with holiday season, but there exist a correlation, read on to know how! Most of the organizations small, medium and enterprise levels invest in security still many a time they find themselves at the receiving end. The reason could be, while they could be doing a lot at one end but they tend to ignore other security risks that they … Read more is an event log management script tool which comes with Windows 2000 Resource Kit Supplement and is used to manage the Event Viewer logs of Windows 2000 based systems. This script tool can be used to perform various event log management tasks like changing properties of the event logs, backing up the log files exporting the event lists to text files, deleting all events from the logs and querying … Read more

In modern IT systems, event logs and vent logging plays a very important role as every application, operating system, network device and system components upload their event messages in log files. Therefore, from the point of view of network management, event logging and log analysis becomes all the more critical. Event logs form the most reliable source of determining the overall health of a network.

These days most organizations invest on more than log management infrastructures which comprise the hardware, software and a media to generate, transmit, store, analyze and organize the log data. Every log management infrastructure has a typical architecture consisting of various components which interact with one another. Following are the major tiers of an ideal log management architecture.