03:45 PM
Dark Reading
Dark Reading
Products and Releases

NetIQ Bolsters Actionable Security Intelligence With NetIQ Change Guardian 4.0

Provides real-time detection and response to unauthorized access and changes to critical files, systems, and applications

HOUSTON – April 9, 2013 – Organizations today face an ever-increasing number of security threats from internal privileged users and external attackers, including APTs. SIEMs are only part of the solution available to Security teams that require true actionable intelligence – the right information at the right time to the right stakeholder – to help identify and mitigate security threats and protect corporate assets.

NetIQ® today announced that Change Guardian&trade 4.0 now detects and responds to potential threats in real time through intelligent alerting of unauthorized access and changes to critical files, systems, and applications.

Most organizations employ SIEM technology as a critical piece of the security infrastructure. However, SIEM alone is no longer enough to achieve sufficient layers of data protection and risk mitigation. Change Guardian complements and extends SIEM by delivering the deeper actionable intelligence on changes to systems and actions of privileged users to more quickly identify and remediate attacks before considerable damage is done.

Providing security teams with details to identify threats and record change – specifics such as who performed the action, what action was performed, when the action was taken, and where the action was taken – and information as to whether or not actions are authorized, Change Guardian 4.0 closes the gap for all SIEM solutions with:

· Rich "before and after" detail for changes to critical files and settings to enable IT to act quickly with minimal expertise.

· Policy-based monitoring that provides the ability to simply specify monitoring policies required for various regulations, mandates, best practices or internal policies.

· Additional platform support for UNIX and Linux to complement existing Windows and Active Directory capabilities.

"Unauthorized change and user activity are a leading cause of security breaches and early indicators of a targeted attack," said Geoff Webb, director, Solution Strategy at NetIQ. "Security teams need actionable information that can extend their ability to manage risk and avoid business disruptions. Our expectations are that as organizations increasingly adopt BYOD, Mobility and Cloud, they will face even greater risks and demands, making solutions like Change Guardian a fundamental requirement to simplify and centralize response."

Availability and Pricing

Change Guardian 4.0 is generally available today worldwide and offered on a subscription basis or perpetual license. For more information please visit

About NetIQ

NetIQ is a global, enterprise software company with a relentless focus on customer success. Our portfolio includes scalable, automated solutions for Identity, Security, Access, Governance, Systems and Application, Service, and Workload Management that help organizations securely deliver, measure and manage computing services across physical, virtual and cloud computing environments. For more information, contact us.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.