LogRhythm, the company that makes log data useful, announced that ALPS, a leading service provider to the financial services industry, has significantly simplified security monitoring, management and regulatory compliance since deploying its platform one year ago. ALPS is expanding its LogRhythm deployment with the addition of the File Integrity Monitoring (FIM) module to detect unauthorized changes and malware across its business critical applications. LogRhythm has enabled ALPS to gain deep visibility into security threats and suspicious activity across its network, systems, and applications - from a single pane of glass.
Established in 1985, ALPS has nearly 350 employees across its four US locations and as of December 31, 2010, the firm manages more than $2.7 billion in assets and provides servicing to more than $288 billion in client assets. ALPS selected LogRhythm to automate security monitoring for hundreds of servers, databases, network devices, security appliances, and applications that span three datacenters, and to meet GLBA (Gramm-Leach-Bliley Act) compliance requirements.
"LogRhythm has allowed us, with one easy-to-use platform, to meet GLBA regulatory compliance requirements, monitor our network and critical applications for security threats, and quickly investigate problems," said Pete Blood, IT Security Professional for ALPS. "With very little effort, we have been able to develop specialized rules to monitor our custom applications for suspicious activity, and protect sensitive files from unauthorized changes. LogRhythm gives us deep visibility into our IT environment, which makes it much easier to secure." LogRhythm Delivers for ALPS ALPS maintains several custom web applications that are critical to its business including a portal that provides customers with access to account information and shareholder reporting data. The company also uses back office applications for mutual fund accounting and transfers that must be kept secure and always available. LogRhythm enables ALPS to protect these critical information systems and sensitive data through centralized log and security event monitoring and management.
"With LogRhythm we generate results faster, and we quickly find bad log-in attempts, multiple user IDs from the same IP address, and symptoms that show someone is trying to get into the system," added Blood. "It's very simple to check the Windows, firewall and custom app logs, which is an important benefit-if someone is trying to get into the system, we need to know."
Keywords: Finance, Financial, IP Address, Internet, Investing, Investment, LogRhythm, Technology, World Wide Web.
This article was prepared by Information Technology Newsweekly editors from staff and other reports. Copyright 2011, Information Technology Newsweekly via VerticalNews.com.
Комментариев нет:
Отправить комментарий