Security Market Segment LS
Wednesday, 19 September 2012 09:30

Attachmate Luminet 4.4 provides continuous monitoring

By

An update to Attachmate's Luminet enterprise fraud management software delivers continuous monitoring of enterprise applications, among other new features.

Attachmate Luminet 4.4 provides improved visibility of enterprise systems through four key improvements.

The new version adds user activity data to security information and event management (SIEM) systems such as NetIQ Sentinel 7 to help audit user activity for signs of data misuse.

Luminet 4.4 provides visibility of user interactions with Oracle Forms 6.5 and 10 applications without requiring any modifications to the code.

User activity with all enterprise applications can be captured in real time, "screen by screen, keystroke by keystroke" according to Attachmate officials, whether information is being updated or merely read.

The information collected through this capability can be used to reveal fraud and to help maintain compliance with privacy and other regulations.

The analytics engine built into Luminet 4.4 detects suspicious activity (as defined by rules and weightings) and generates real-time alerts.

Analytics activity is recorded for subsequent use in audits or legal actions.

"The SIEM integration was undertaken because of strong market demand and requests from existing customers to add the user activity data within Luminet to SIEM solutions across the board," said Tom Bice, vice president of marketing and product management at Attachmate.

"By taking this step, we've made it possible for traditional SIEM engines to see data they don't typically see, which builds context around user activity and enhances overall data monitoring."

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments