Select Page

File Integrity Monitor

tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted.

File Integrity Monitor FIM detects change by first establishing a highly detailed baseline version of each monitored file or configuration in a known and trusted state. Using real-time monitoring, it detects change to any aspect of the file or configuration and captures these in subsequent versions.

Versions provide critical before and-after views that show exactly who made the change, what changed, and more. True FIM also applies change intelligence to each change to determine if it impacts integrity (for example, rules that determine if the change takes a configuration out of policy or is one that is typically associated with an attack).

File Integrity Monitor

File Integrity Monitor Key Benefits

N
Hybrid environment auditing
N
At-a-glance display
N
Hosted dashboard
N
Object protection
N
Real-time alerts on the move
N
SIEM integration
N
Auditor-ready reporting
N
Provides a reliable host-based intrusion detection system that safeguards against exploits and breaches
N
Captures change data , including who, what, when and even how details
N
Continuous, real-time change detection across the enterprise infrastructure—virtual, physical and cloud—to detect and respond to malware

File Integrity Monitor Products

Tripwire

Tripwire Enterprise File Integrity Management and Security Controls

Forcepoint

Quest Change Auditor

Let’s Start a Conversation

We’re ready to lead you into the future of security

Name*
Email*
Company*
Job Title*
Message