Most regulations related to the cloud, including SOX, PCI-DSS, HIPAA/HITECH, NERC, GLBA, ISO, and ITIL require that log data be retained for 10 years for forensics and accountability. Additionally, corporate information security teams want not only for alerting capabilities (correlated, targeted, or behavioral) to tell them when something happens, they want forensics data to tell them the “who, what, when and where.”
To satisfy these requirements and provide organizations with peace of mind, CipherCloud solutions monitor all user interactions across all clouds and transparently capture data to generate an automatic audit trail of all user activity.
CipherCloud solutions supplement the limited logs provided by cloud service providers by tracking all “read” and “write” actions. For specific cloud interactions, CipherCloud systems record the user involved in an activity, a timestamp capturing the date and time, what actions users performed, and what records they accessed. In addition, CipherCloud solutions record both the source and destination IP addresses of user activity. These logs can then be fed into existing log management solutions.
Next: Learn how CipherCloud protects against malware.
See an online demo of the CipherCloud solution now.
Download the business whitepaper CipherCloud Encryption Gateway – Overcoming Cloud Security & Compliance Concerns