contents

software
 
Compliance Commander Defender by Intrusion is Released

Intrusion Inc. has announced the release of Compliance Commander Defender, its Database Protection System designed to prevent internal fraud. Defender is the second and most recent offering in the Compliance Commander Identity Theft Prevention family. Defender protects against improper database access and usage by monitoring all network-attached devices attempting to download private information.

Compliance Commander Defender offers the following capabilities:

* New Device Attempt:
Defender monitors all data communications between network-attached computers and the database and file server. When any new device attempts to connect with the database or file server system, its identification is registered by Defender and checked against known devices with prior access permission. Any new device not previously registered triggers an immediate alert to the Compliance Commander web-based management system.

* Data Volume Change:
Defender monitors all data access activity of approved devices, looking for volumetric changes in resource usage. Once a given device attempts to download data records outside of a baseline range defined by Defender, an alert is triggered to the Compliance Commander Management system notifying IT staff of the data access attempt.

* Unknown Applications:
Defender monitors all data communications between network-attached computers and the database or file server. When a new application connects to or is used from the monitored resource, its identification is registered by Defender and checked against known devices using the application in question and alerts if it is unknown. Any new device or application not previously registered triggers an immediate alert to the Compliance Commander Management system.

* Forensic Analysis:
Defender offers deep forensic analysis of all resource usage for the critical IT resource, allowing the administrator to view all activity for a particular device or application using the database or file server. Changes in resource usage are tracked and displayed chronologically for different time periods, allowing the administrator a holistic view of user or application activity.

* Tiered Reporting:
Using the Compliance Commander Provider Management system, administrators are given organization, division, and device-level views of resource usage changes across all monitored IT resources.



write your comments about the article :: © 2006 Computing News :: home page