File Integrity Monitoring Software
All Products
(1-16 of 16)
ADAudit Plus offers real-time monitoring, user and entity behaviour analytics, and change audit reports that helps users keep AD and IT infrastructure secure and compliant.
- Track all changes to Windows AD objects including users, groups, computers, GPOs, and OUs.
- Achieve hybrid AD monitoring with a single, correlated view of all the activities happening across both on-premises AD and A…
AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, including SIEM, intrusion detection, vulnerability management, as well as continuo…
Learn More About File Integrity Monitoring Software
What is File Integrity Monitoring Software?
File Integrity Monitoring (FIM) Software detects changes to critical system files including directories and registries, executable files and packages, configuration files, and sensitive data files such as password files. These events could be indicative of hostile intrusions or unauthorized access which might result in illicit modifications of critical information. Updates to vital resources are compared to their trusted baselines. These changes are logged, and alerts are created for suspicious activity, enabling follow-up auditing, analysis, and remediation.
FIM software supports continuous or scheduled monitoring, reviewing credentials, update access and permissions, file contents, hash, and configuration values. it identifies which user initiated the changes. FIM software is also used to review installations to see if systems are running their most current software versions and whether relevant patches have been applied. FIM software monitors Windows, Linux, Unix, and macOS systems. FIM software is especially valuable for highly regulated industries such as finance and health care, and for companies with sensitive or proprietary data.
File Integrity Monitoring Software Features
File Integrity Monitoring Software includes many of the following features.
- Detect file creation, modification, or deletion
- Monitors files, folders, registry keys, packages, databases, and directories
- Real-time monitoring
- Continuous, scheduled, snapshot, or random monitoring times
- Asset identification
- Security policy templates for monitored resources
- Custom security policies
- Rule-based monitoring
- Reputation databases
- Baseline setting
- Baseline and/or checksum integrity checking
- Monitoring intelligence for suspicious activity
- Alerting, recording, and reporting
- Capture file path, hostname, cluster, user, time of the event, before and after images
- Response and resolution tracking
- Search: file, host, cluster, event type, priority, user, time range
- Dashboards
- Support Windows, Linux, Unix, macOS
- Scalable
- Local, remote, and cloud-based monitoring
- On-premise, cloud-based, hybrid installations
File Integrity Monitoring Software Comparison
Consider the following when purchasing File Integrity Monitoring Software.
Security Suite vs. Standalone Products: FIM capabilities are often included in broader security suites such as Security Information and Event Management (SIEM), Intrusion Detection Systems, Log Management Tools, and Privileged Access Management Solutions. Stand-alone FIM software usually provides ready integrations with those solutions.
On-premises vs Cloud-based Installations: When appropriate for your environment cloud-based FIM solutions offer global reach, simplify implementation, and reduce the need for multiple point product installations and their potentially higher costs.
Platforms: Some FIM products can be installed on and support multiple operating systems, others will only support Windows or Linux/Unix.
Scalability: Depending on the size of your IT infrastructure, FIM can create a large amount of information to be reviewed. For enterprise-scale monitoring, your selection should provide the ability to narrow its focus to essential resources and critical updates.
Pricing Information
Most vendors recommend obtaining an FIM custom price quote based on your IT infrastructure and requirements. When FIM features are included as part of a larger security solution the cost is often bundled in with its other components. Free trials are available and there are free open-source options