Prism Microsystems

Displaying 1-2 of 2 results

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Sep 2009

    Meeting HIPAA Compliance With EventTracker

    There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the Security Rules of Title II (Administrative Simplification) of the Health Insurance Portability and Accountability Act (HIPAA). HIPAA calls for tightly controlling and monitoring access to confidential patient information, and specifically calls...

    Provided By Prism Microsystems

  • White Papers // Nov 2009

    Security Beyond the Windows Event Log - Monitoring Ten Critical Conditions

    Monitoring the Windows Event Log is critical because the Operating System continuously monitors and logs critical security, system and application events in the Log. Monitoring the Windows Event Log alone, however, is simply not enough because many important conditions in Windows are not stored in the Event Log. The following...

    Provided By Prism Microsystems