ACS Sizing - Revisited
Given the large amount of data collected by ACS, predicting the size of the ACS database is crucial. Secure Vantage has had the ACS Database Planning Calculator on the resources page of our website...
View Article10 Steps to Passing Your Next PCI Audit - Step Seven
Document, Document, Document As an auditor I like to use the axiom “If it is not documented it does not exist. Meaning it can’t be proven. It is always better to have a published policy or procedure...
View ArticleUse What You Own
It's actually a quite simple concept. But, for the purposes of illustrating my point, let's say you have the latest and greatest mobile phone. It makes phone calls, surfs the web, takes pictures, you...
View ArticleVisit us at TechEd North America 2011
SVT will be attending TechEd North America 2011 in Atlanta, GA. We will be there all week so come and check us out under the System Center Partner Pavillion in the Expo Hall. Don't forget to enter our...
View Article10 Steps to Passing Your Next PCI Audit - Step Eight
Find the Weaknesses Before the Bad Guy Does Depending on your type of organization and your transaction volume PCI DSS requires periodic third-party scanning. Not everyone can do these third-party...
View Article5 Audit Requirements System Administrators Should Care About | June 2011...
Background I was reading an eMagazine article the other day about the 10 biggest security breaches of 2011 - so far. And it occurred to me how often incidents end up on a list like this because the...
View ArticleACS Time Settings - UTC vs. Local
ACS has two time configurations: UTC and Local. Normally, these are set at installation time. Understanding the differences between the times will help in choosing the correct format. For the most...
View ArticleWindows 2008 Read Only DC – Need to monitor with ACS?
Windows 2008 introduced a new form of domain controller, the Read Only Domain Controller (RODC). The RODC allows authentication and controls rights, but it does not allow modification of the Active...
View ArticleManagement and Monitoring Tips for Security Event Logs
Background Monitoring even logs is a tricky business. It doesn't matter what vendor we are talking about, event logs can be confusing and even misleading. Event logging is a tradeoff between...
View ArticleCustomizing the Reporting Logo
Many organizations prefer their corporate logo on the reports we provide. The process is very simple to perform and available when the next report run occurs. Logo Specifications When creating the...
View ArticleWindows 2008 Read Only DC - Need to Monitor with ACS?
Windows 2008 Read Only DC – Need to monitor with ACS? Not Published Wednesday, May 04, 2011 3:59:45 AM by Chance Folmar posted in ACS Windows 2008 introduced a new form of domain controller, the Read...
View ArticleACS Test Environment Requirements
Before installing any system into production it is necessary to first run the system through acceptance testing. However, hardware expenses make it unreasonable to develop a full blown test system...
View ArticleNew! Protect Confidential Information with Ease via SVT's New Partner: Bystorm
SVT recently entered into a marketing partnership with ByStorm Software. The ByStorm FileSure product provides low-footprint file access auditing, access control, and compliance. Previously, SVT...
View ArticleEstablishing Controls to Protect Confidential Data | November 2011 Newsletter
Summary In business or accounting, IT controls are generally defined as “specific activities performed by persons or systems designed to ensure that business objectives are met.” In the IT world, that...
View ArticleComputer Forensics and Internal Investigations | December 2011 Newsletter
Businesses today are constantly being made aware of the challenges of computer fraud, computer security gaps, and cybercrime. Hacker groups have been prevalent in the news lately, showing companies...
View ArticleSCOM 2012
The release of System Center Operations Manager 2012 is upon us, and the question on everyone’s mind is "Will SVT support it?" The answer is ‘Yes, we will support it." As of now the schedule release...
View ArticleHoliday Office Hours
The SVT offices will be closed Monday, December 26th, 2011. During this time support will be unavailable. Our office will reopen on Tuesday, December 27th, 2011 at 9:00 A.M. CST. Should you need...
View ArticleCompliance: One Size Doesn't Fit All | January 2012 Newsletter
Compliance has become an incredibly important part of daily operations for many organizations today. Being able to show the organization is in compliance with requirements like HIPAA, SOX, NERC, or...
View ArticleAchieving Audit Nirvana Through Control Automation and Visibility | April...
The Problem You have probably seen it in the news recently – the latest big security breach. Both Visa and MasterCard announced that a “third-party processor” experienced a data breach exposing...
View ArticleEnter The Age Of The Auditor
Background Blame it on the WorldCom or Enron scandals, the rise of electronic payment transactions or the advent of cyber crime/espionage/maliciousness but in any case we have seen the increase of...
View ArticleNext Change To PCI DSS
June is here and the next change to the Payment Card Industry Security Standards Council (PCI SSC) requirements is about here. On June 30, 2012 Level 1 and Level 2 merchants are required to have...
View ArticleThe Importance of Security Controls: A Reminder
You know hackers are not always sneaky outsiders with poor hygiene that pose security threat. Between April 2010 and March 2011, 513 United Kingdom civil servants were found to have made "unauthorised...
View ArticleThe Cost of Ineffective Security
Background In early June LinkedIn – the giant professional networking site - confirmed that more than 6 million of its users’ passwords were compromised. The site boasts more than 160 million users and...
View ArticleNew SVT Partner - Squadra Technologies
In a perfect world, you would want the computers in your environment to be protected from malicious Removable Media incidents while still allowing proper use of them as productivity aids. This is where...
View Article
More Pages to Explore .....