Shop Stealth-ISS Group Inc.

FIM for Servers

$420.00$542.00

Server Integrity

Server integrity is more than simply detecting changes in the case of File Integrity Monitoring (FIM). Integrity is the confidence and certainty that the appropriate controls, processes, and compliance requirements are in place to ensure the accuracy and consistency of data throughout its entire life cycle of operation. Learn more about FIM here.

FIM is a critical component of your multi-layered security approach, This tool allows users to detect and classify changes to vital computer server elements, including operating system files, directories, data files, file attributes, configuration settings, policies, port settings, Windows Registry, and more. It works on both physical and virtual servers such as VMWare as well as Cloud-based systems such as Amazon EC2 and supports many operating systems including Windows, Linux, UNIX, FreeBSD, and more.

12 Month Minimum Contract
You will be contacted for product setup and onboarding within 1 business day from purchase
SKU: N/A Category: Tag:

FIM provides the necessary controls and integrity assurance that your servers have not deviated from a known and trusted state of operation through best practices of system hardening, configuration, and change management. By managing the process of authorized and expected changes, server integrity can be maintained on an ongoing basis.

It all begins with the identification of change. This platform utilizes a patented real-time, proprietary methodology for detecting changes to servers. Once identified, it will interrogate that change with a number of best practice controls and processes to determine if the change is expected or unexpected (good or bad). The “expected” change will be suppressed and stored for audit and forensic purposes. The “unexpected” change will undergo further review and investigation to determine if it was a circumvented process (non-malicious) or a security incident (malicious).

In either event, a manual or automated process can be triggered to roll back and remediate to any number of previously trusted and secure baselines of operation.