World Class File Integrity Monitoring
Honeycomb’s LexFileMonitor (FIM) is part of Honeycomb’s LexCollect Technology stack. This allows your FIM project to be centrally managed with all the other data collection modules you get from LexCollect (Windows logs, DNS files, web application files etc.). This centralized management greatly simplifies the task of collecting data from vast numbers of devices across many locations.
For details on the business benefits of Honeycomb LexFileMonitor, and how it fits into your Security Intelligence strategy, have a look at the File Integrity Monitoring solutions page.
In today’s security and compliance-conscious world, it is not enough simply to know that a file has changed – you need to know by whom and when amongst other parameters.
LexFileMonitor gives you this information in a transparent, automated way – in real-time, even if the network is offline – allowing you to monitor large volumes of data without impacting the performance of your systems.
Underpinned by Honeycomb’s philosophy of comprehensive data collection and flexibility, LexFileMonitor allows you to select the level of file monitoring required – from highly secure local endpoint monitoring of NTFS file systems, through to agentless monitoring of remote workstations. You are covered for compliance, security and operations right down to the file system level, reporting on: -
- The specific user that accessed a file
- The type of access (for example open, modify, delete)
- Precisely when a file access operation occurs
- The remote or local station a user was logged-in from when a file access operation occurs
This pie chart shows file access usage statistics for the Administrator user on a particular server:
Here’s the same data presented as a 3D bar graph:
In fact, LexFileMonitor provides data for all kinds of visualizations, including:
- Bar and Pie Charts
- Time charts – User View
- Time Charts – File View
- Trend graphs
- Event Lists
- Statistical analysis graphs
- Big Data Catalog views
For more information on LexFileMonitor and how it can greatly enhance your Security intelligence and Compliance projects, read the LexFileMonitor datasheet, or check out the File Integrity Monitoring solutions page.