IBM i Change Management Tracking

iSecurity Change Tracker

iSecurity Change Tracker is a comprehensive monitoring solution which automatically logs object changes made to production libraries at both the source and object levels.

Change Tracker provides a simplified Change Management System (CMS) solution for the procedures needed to trace program objects and file changes.

image
image

Streamlines and automates native IBM i Change Management

image

Ensures the auditability and validity of changes within production libraries

image

Tracks all change details, including create, delete and modifications, ensuring accountability and transparency

image

Immediate status report generation aids auditor’s productivity and throughput

image

Rapid implementation enables rapid deployment, allowing organizations to quickly enjoy its change tracking benefits

Features of iSecurity Change Tracker

image

Auditor Access

With iSecurity Change Tracker, auditors have access to all the data they require, such as who made changes, why, when and from which IP address. A built-in Report generator and Scheduler includes a set of queries tailored to specific auditing needs. Output can be tailored to user preferences, whether they need PDF, HTML, CSV and other formats.

Change Classification

Log entries can be classified in accordance with the company’s pre-defined applications, projects and tasks. Classification further increases company transparency and auditor comprehension.

image
image

Source File Tracking

iSecurity Change Tracker’s unique flexibility in configuration allows you to avoid recording changes already logged by an existing CMS, eliminating duplicate processing. If source files are available (such as programs), Change Tracker saves and displays source file changes. Source file changes that are restored retain important information such as the date of last change.

Latest Blogs

image
IBM i
February 21, 2024
How to Create IBM i Password Security Policies
image
IBM i
January 30, 2024
Five Steps to Eliminate Default IBM i User Passwords
image
IBM i
January 17, 2024
What is Phishing-Resistant Multi-Factor Authentication?

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW