Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 27, Issue 4

Full Contents Now Available!

Log Management: When Disaster Strikes You’ll Be Glad You Did

Written by  MISHA GOVSHTEYN January 13, 2014

How Log Management Can Enhance Infrastructure Security in Disaster Recovery Situations When an enterprise network goes down – because of natural disaster, accidental system failure, or security breach – the first priority is identifying the impact and restoring the infrastructure to its pre-disaster state. However, how “clean” is the pre-disaster infrastructure? Have servers been tainted with malware that can replicate to multiple data systems on the disaster recovery site and allow security breaches? Were data confidentiality, integrity, and availability compromised in any way, either before or during the incident? And would you have the data required to troubleshoot these issues during an outage? The bad news is that such security breaches are often not found for weeks or months after they occur. However, log management best practices can provide those answers and help you determine if you’re working with a compromised infrastructure following disaster recovery (DR). Moreover, compliance with PCI, Sarbanes-Oxley, HIPAA,

PLEASE SIGN IN TO CONTINUE READING.

Not a Member? Subscribe Today For Free! Membership Includes:

  • Free delivery of DRJ's Quarterly Magazine
  • Free online access of DRJ's latest Magazine
  • Free access to the DRJ Archives
  • Informational Updates
  • Conference alerts and information
  • Free White Papers
  • Free blog posting
  • And much more!