Technology: New Logs Show Who’s There
In tough neighborhoods, when there’s a knock on the door, street smart people don’t unlatch the deadbolt until they know who’s there.
In the computer world, log management aims to identify who’s clicking on and verifying that person should be allowed access. With smartphones and other devices adding to the access points, IT staffs are working to keep up.
“The big benefit for us has been enhancing the security of our infrastructure,” Spero said. “Being able to quickly identify any kind of problem so we don’t have to do it manually is hugely important to us. The biggest thing, whether it’s log management or any other security device, is not forgetting about the big picture.”
The credit union also performs internal vulnerability scans and external vulnerability scans and is starting to go as far as monitoring some of its cloud-based applications proactively on a minute-by-minute basis, Spero said.