Web security planning

It is highly recommended that a security audit is made prior to deployment, and log files are written to several servers.

There are several applications that do this with no specific need for Sterling™ Order Management System Software to duplicate their efforts. Additionally, products like Symantec's Intruder Alert monitor log files for authentication failures and alert an administrator if a threshold is exceeded.