Jim Lioyd
Information Systems Manager,First Mountain Bank
The Management of First Mountain Bank was facing the challenge of staying compliant with its independent auditors and the Federal Deposit Insurance Corporation (FDIC) compliance audit requirements. Auditors and the FDIC directly and regularly examine and supervise all banks in the U.S. for operational compliance, safety and soundness.
Read Online
Syed Islam
IT Manager,TRA
TRA holds an ISO 27001 certification and is one of the meager 65 companies in the US to hold this prestigious distinction - a feat that speaks volumes about the company's high standards of Information Security. Retaining this prized certification requires establishing the security of the company's IT assets and also keeping the network safe from the mishaps that arise out of inadvertent breaches of security by the administrative users.
Read Online
Devank Kumar
Manager Enterprise Systems, TRC Companies,Inc
As a public company, TRC's network operations team also has an additional responsibility of collecting, retaining, and reviewing terabytes of audit trail logs, generated by their network infrastructure, to support IT process controls of Section 404 of the Sarbanes-Oxley (SOX) Act.
Read Online
Dimitri Yioulos
Cheif information officer, Onpoint Financial Corporation
Indepth log analysis is essential in the financial services industry to meet compliance requirements and maintain enterprise-wide security. Financial services companies are entrusted with customers' financial data and so a continuous monitoring of the activity logs helps readily detect suspicious activities that could lead to breach of data.
Read Online
Joseph Graziano MCSE CCA VCP
Senior Network Engineer,Citadel
Banking and financial institutions are at a greater IT security risk than other companies. They have to ensure the security of the data and other IT resources in their environment. Additionally, government imposes a set of regulations for these companies to comply with. As part of the assurance of the data and IT resources security, Citadel's network engineer wanted to monitor the audit logs of the Administrator users in particular, on critical servers in the network.
Read Online
The Office of Information System (OIS), FDoT handles thousands of users comprising of employees, consultants and contractors. The challenge faced by the FDoT was, grant of Administrator privilege going unnoticed and there was no mechanism in place to notify the Network Security Analyst when such an incident happened.
Read Online
Satoshi kinugawa
Senior Manager / Head of Infrastructure Team
The main challenge for the Benefit One Infrastructure Team was to ensure stable, 24x7x365 round the year, uninterrupted availability of Benefit Station website (https://bs.benefit-one.co.jp). After a detailed system study, the team decided to automate their system resource monitoring and IT infrastructure maintenance by outsourcing their operations management.
Read Online
The main challemge for GungHo Online Entertainment company was to collect, categorixe, sort, search and generate graph report of the logs from various devices, systems. Using the log reports, the company wanted to automatically diagnose the root cause of the network incidents.
Read Online