Solved

File Audit Hardware Solution

Posted on 2011-09-14
3
370 Views
Last Modified: 2012-05-12
Hello,

We are looking for some sort of hardware appliance that we can put in front of a file server that can audit file access.  The device should also be able to govern which workstations have the ability to access the file server functioning like a firewall in a sense.  We have looked at several solutions, but none quite meet our needs.  If anyone would have any suggestions, it would be greatly appreciated.  Thank you.  
0
Comment
Question by:Techop09
  • 2
3 Comments
 
LVL 62

Expert Comment

by:btan
ID: 36547793
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 37135467
Xceedium does fit the bills unless you have more specific requirements which can be better addressed. Importance is the logging capability for audit and potentiLly you needed some external log server since the verbose logging has to be managed.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ensuring effective and secure communication in the age of healthcare BYOD.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now