Can anyone tell me the difference between these two products? What are the advantages and disadvantages of both? We're looking for a product that will give us audit trails of what servers users have accessed as well as what files. In addition we want some sort of intrusion detection.
Thanks for your quick response.
Mike