Compliance Audit Reports for Gramm-Leach-Bliley Act (GLBA)

GLBA Compliance Report

Section 501 of the Gramm-Leach-Bliley Act (GLBA) documents specific regulations required for financial institutions to protect "non-public personal information". As part of the GLBA requirements, it is necessary that a security management process exists in order to protect against attempted or successful unauthorized access, use, disclosure, modification, or interference of customer records. In other words being able to monitor, report and alert on attempted or successful access to systems and applications that contain sensitive customer information.

EventLog Analyzer meets the system monitoring and reporting requirements of GLBA Regulations. With EventLog Analyzer, you can easily monitor your network systems for any insider activity. GLBA regulations mandate analysis of all logs, including OS and application logs.


The types of reports that EventLog Analyzer provides for GLBA Audits are as follows:

  • User Logon report:
    GLBA Compliance requirements clearly state that user accesses to the system be recorded and monitored for possible abuse. Remember, this intent is not just to catch hackers but also to document the accesses to medical details by legitimate users. In most cases, the very fact that the access is recorded is deterrent enough for malicious activity, much like the presence of a surveillance camera in a parking lot.
  • User Logoff report:
    GLBA requirements clearly state that user accesses to the system be recorded and monitored for possible abuse. Remember, this intent is not just to catch hackers but also to document the accesses to medical details by legitimate users. In most cases, the very fact that the access is recorded is deterrent enough for malicious activity, much like the presence of a surveillance camera in a parking lot.
  • Logon Failure report:
    The security logon feature includes logging all unsuccessful login attempts. The user name, date and time are included in this report.
  • Audit Logs Access report:
    GLBA requirements (review and audit access logs) calls for procedures to regularly review records of information system activity such as audit logs.
  • Multiple servers and Devices
    Record syslog information  and monitor from a central location. Record syslogs from Routers, Switches and Servers with Silver or Gold plan 

What Platforms and Devices we support

EventLog Analyzer can collect and report on event logs from the following operating systems, devices, and applications: Windows NT/2000/XP/Vista/2003 & 2008 Servers, Store up to 100 GB of logs and archive years worth at our Secure Facility.

Other Devices that may be supported  are: Linux - RedHat, Debian, UNIX - Solaris, HP-UX, Switches and Routers - Cisco and others, SNARE for Windows, IIS - Web server, FTP server and MS SQL server. 

More Samples- click to view 

 

Drill Down to see Details

 

Dashboard shows overview

 

Alerts can be emailed


Many reports available including specifically geared towards GLBA, HIPPA, PCI can be emailed on schedule or generated on demand.