Cimcor

Take Control of Change to Your Critical IT Assets.

Managing change within the IT enterprise is critical to maintaining IT security and compliance and is considered a best practice in IT management.

CimTrak ensures the availability and integrity of your critical IT assets by instantly detecting all changes to your applications and infrastructure

When a change is detected, CimTrak captures it at the exact moment it occurs and provides a detailed audit trail of the incident, including:

  • Where the change was made
  • When the change took place
  • Who made the change
  • How the change was made
  • What was changed

Determining who, what, and when something has changed since the last audit cycle is as simple as generating a report.

 

This level of detail and analysis is critical to your IT organization which must have documentation at the ready to prove continuous compliance with an ever-expanding list of regulations as well as assist you in tracking changes as they occur for routine review.

CimTrak’s “Deny Rights” and “Restore” modes allow users to either completely prevent or instantly revert changes to critical systems. This allows CimTrak to detect and respond to unexpected changes so that your critical business functions remain available to employees, customers, and suppliers.

Advanced Ticketing Capabilities

The first file integrity monitoring tool with integrated ticketing capabilities, CimTrak differentiates good change from the bad, allowing the focus and resources to be directed where you need them.

Keeps Your Systems Secure and Running

CimTrak’s change control and configuration management features ensure that your critical IT assets cannot be tampered with, either maliciously or inadvertently, without detection. This guarantees that your systems keep running the way they are intended to, so there is no interruption in your business operations or compliance violations.

What is File Integrity Monitoring

File integrity monitoring (FIM) detects changes to critical files including system, application, and configuration files. Many file integrity monitoring solutions are a part of a host-based intrusion detection system (HIDS), and can also monitor other closely related items such as the Registry, installed software, and local users and groups.

Insider threats or insider abuse may also warrant the use of a FIM software, and with threat management and data protection becoming the norm, tracking changes and security controls can allow for continuous monitoring and constant state of compliance.

  • Simple to install, configure and manage
  • No time-consuming training or professional services required
  • VirusTotal integration allows quick identification of threats
  • Truly real-time change detection
  • Integrated ticketing capabilities allow classification of changes, maximizing security by focusing attention on the most critical changes.
  • Trusted File Registry™ service allows automatic reconciliation of known vendor updates and patches, resulting in significant time savings

FIM And PCI – What’s the Connection?

PCI DSS and file integrity monitoring fit together like a hand in a glove. Specifically, sections 10.5.5 and 11.5 require change detection mechanism to be put in place:

PCI DSS 11.5

“Deploy file-integrity monitoring software to alert personnel to unauthorized changes of critical system files, configurations files, or content files; and configure the software to perform critical file comparisons at least weekly.”

PCI DSS 10.5.5

“Use file-integrity monitoring or change detection software on logs to ensure that existing log data cannot be altered without generating alerts …”

Trusted File Registry™

The CimTrak Trusted File Registry™ eliminates false-positive issues by automatically recognizing vendor-verified patches or updated files and promotes them to the organization’s baseline.