Systems integrity, configurations and information security policies monitoring technologies.
Control and changes coordination process takes place without creating configuration redundancy, reducing vulnerabilities number and increasing overall system efficiency. All changes of user permissions in systems, group and domain policies settings, system components options and other IT infrastructure functions are recorded with Change Control class systems for further reports inspection by security officers and IT personnel. Changes management solutions allow malicious technological threats activity determination, including viruses, worms and exploits.
all elements: 2