[metaslider id=2951] … Read More
DCID 6/3/NISPOM Chapter 8/JAFAN DoD
While we lump these requirements into one, they are subtle difference. Most of these regulations now fall FISMA (Federal Information Security Management Act of 2002.) As with most compliance regulations it is the need to protect sensitive data, and as with most there is a need to protect the perimeter, use an Antivirus product, etc. One of the biggest difference between these and other compliance regulations is the fact that some areas are classified areas, and do not connect to the internet. This posses a bit of a challenge when it comes to monitoring the activity within these classified areas.
We have the Solarwinds Log & Event Manager tool, which again does not require an internet connection, and provides a robust library of reports, file integrity monitoring and more.
Another tool that may be of some benefit is the network monitoring tools Hexis NetBeat MON. This tool is describe as a Network Hygiene Tool, and includes some of the industry best of breed including wireshark, Ntop, and Snorby.
We have extensive experience in this area, and invite you to contact us for more information.