How can attacks be avoided?
✓ Ensure essential controls are met
✓ Find, track, and assess data
✓ Monitor event logs
What do attacks have in
common?
75% were not discovered
83% were not highly difficult
87% were avoidable
How do breaches occur?
62% system error
59% hacking and intrusions
31% incorporated malicious code
22% exploited a vulnerability
15% physical threats
Who is behind data breaches?
73% resulted from external sources
18% were caused by insiders
39% implicated business partners
Log File Analysis |
This module was conceived especially for your firewall environment. We analyse your log files irrespective of which manufacturer you apply,. At weekly or monthly intervals we compile an extract of the most important events, from which you can derive trends and measures to be taken. You save the time and effort of having to forage through millions of entries and so have more time to concentrate on the important issues. Advantages at a glance:
|
![]() |
|