Web security planning
It is highly recommended that a security audit is made prior to deployment, and log files are written to several servers.
There are several applications that do this with no specific need for Sterling™ Order Management System Software to duplicate their efforts. Additionally, products like Symantec's Intruder Alert monitor log files for authentication failures and alert an administrator if a threshold is exceeded.