One of the tricks to Event Log Management is making sure what you are seeing corresponds with what is happening. Our health report ensures consistent collection of logs. We monitor that report in real time. Of course, if there’s anything wrong we’re on it immediately, but we also push daily information to you that helps […]

At infotex, we understand that a cookie cutter approach may be more “economy-of-scale,” but it is not always the best approach to risk mitigation. Using our templates as a starting point, so you can “see what others are looking for,” we’ll then work with you to configure and tune the event log management process using […]

Risk Management

Risk Management Program Examiners have made it clear:  if your management team understands the risk exposure of information and technology to your bank, you are definitely heading in the right direction.  If risk is considered in all technology decision making, an effective IT risk management process has been implemented. The standards themselves call for a […]

User Awareness Training Workshop

GLBA Information Security: Teaching Acceptable Use to Your Users User Awareness Because Information Security is a team effort, awareness is the most important control.  Financial Institutions must maintain an appropriate Acceptable Use Policy and teach the concepts inherent in that policy.  The training should stress the threats and vulnerabilities financial institutions face, and help users […]

Workshops

Any topic you’d like us to present? Let us know! Join us in Education and Awareness! We have always subscribed to the philosophy that the best mitigating control is Awareness.  Our talks and workshops are all designed to increase your awareness of the various topics we speak about, and yet they are also a great […]

We consolidate, monitor, report on, and respond in real-time to logs from your servers, firewalls, workstations, active directory, spyware defense, and anti-malware systems, Microsoft Exchange servers, core processors, and on-line banking systems. Any device or application that generates logs in syslog format can be filtered through our system and analyzed. We also provide interactive daily […]

Our team of certified security data security professionals is working behind the scenes, 24 x 7 x 365, looking to find your needle in the hay-stack. During the tuning process we will walk you through a tried-and-true process that allows you to determine which log events you want to respond to in real time, versus […]

We started tuning event log management systems for our clients in 2005, and thus our process helps you find that needle in the haystack in a manner that has evolved over many years, and many installations. Our process minimizes the effort you will spend, and is designed by professionals who do nothing but tune out […]

30 Day Guarantee

The purchase of any of our boilerplates comes with a 30-day money back guarantee.  If, for any reason, you are not 100% satisfied with a boilerplate, contact us and we will refund your money. Don’t forget to read about our other terms and conditions regarding the purchase of our boilerplates. By using this boilerplate, you agree […]