Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Centrify Corporation > Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security
 

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

White Paper Published By: Centrify Corporation
Centrify Corporation
Published:  Dec 02, 2014
Type:  White Paper
Length:  13 pages

Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment.

This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment. 



Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications