• Almost all attacks (malware based or targeted attacks) makes changes in system files by modifying or by adding root kits or by disabling the altering systems and thus leave traces behind. Using an agent on the important server’s folder , the checksums details are sent to iTaaS server from time to time for analysis to understand what has changed. This results into knowledge of any potential threat on the server.
  • File integrity Monitoring is required by PCI compliances.