How is data integrity managed for Threat Manager? | Threat Manager FAQ

Data integrity is monitored and validated as each data packet is received. An SHA-256 digest is calculated from the entire packet and verified when received and written to the static Alert Logic® data grid. This audit and data store prevents the deletion or modification of individual records and allows organizations to count on the accuracy and the integrity of the log records. The status of the Alert Logic Threat Manager™ data replication and packet validation process is monitored by the Alert Logic Infrastructure Support team on a real-time basis to ensure replications are successful. Integrity checks will alert if corruption were to occur, log the incident, and escalate to the Infrastructure Support team for repair.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Please sign in to leave a comment.