Trusted integrated innovative managed business security risk solutions?
Maintain two systems, a primary one to run the business, and a second one that keeps an irrevociable audit of activity on the first. A combination of cloning the log files and monitoring at the IP layer. Use a PKI key on a hardware dongle to allow access from the clients. Key monitoring and revocation is carried out on the second system.
"We deliver integrated, innovative, and trusted security solutions that are proven to manage business risk and maximize your information security investment .. Our consultants hold a variety of global IT and security certifications, including CHECK, CLAS, CISSP, CISM, CISA, CLEF, IISP, ISO 27001 Lead Auditor, PCI QSA, and others".