Trusted integrated innovative managed business security risk solutions?
Maintain two systems, a primary one to run the business, and a second one that keeps an irrevociable audit of activity on the first. A combination of cloning the log files and monitoring at the IP layer. Use a PKI key on a hardware dongle to allow access from the clients. Key monitoring and revocation is carried out on the second system.
-------
"We deliver integrated, innovative, and trusted security solutions that are proven to manage business risk and maximize your information security investment .. Our consultants hold a variety of global IT and security certifications, including CHECK, CLAS, CISSP, CISM, CISA, CLEF, IISP, ISO 27001 Lead Auditor, PCI QSA, and others".
Wha?