Automating Data Protection
More than 95% of file access activity is not audited by IT. Why? Windows event auditing is cumbersome, as is BSM on Solaris, and audit on AIX. Linux didn’t even have auditing capabilities until the Linux 2.6 kernel audit system was introduced. Netapp, EMC Celerra, Exchange and SharePoint audit functionalities all require moderate to extensive effort just to capture events, and capturing an audit trail is just the beginning. Once the events are captured, they need to be aggregated, normalized, and analyzed so they can become more than just log data and we can make use of them.