IBM i Change Management Tracking

iSecurity Change Tracker

iSecurity Change Tracker is a comprehensive monitoring solution which automatically logs object changes made to production libraries at both the source and object levels.

Change Tracker provides a simplified Change Management System (CMS) solution for the procedures needed to trace program objects and file changes.

image
image

Streamlines and automates native IBM i Change Management

image

Ensures the auditability and validity of changes within production libraries

image

Tracks all change details, including create, delete and modifications, ensuring accountability and transparency

image

Immediate status report generation aids auditor’s productivity and throughput

image

Rapid implementation enables rapid deployment, allowing organizations to quickly enjoy its change tracking benefits

Features of iSecurity Change Tracker

image

Auditor Access

With iSecurity Change Tracker, auditors have access to all the data they require, such as who made changes, why, when and from which IP address. A built-in Report generator and Scheduler includes a set of queries tailored to specific auditing needs. Output can be tailored to user preferences, whether they need PDF, HTML, CSV and other formats.

Change Classification

Log entries can be classified in accordance with the company’s pre-defined applications, projects and tasks. Classification further increases company transparency and auditor comprehension.

image
image

Source File Tracking

iSecurity Change Tracker’s unique flexibility in configuration allows you to avoid recording changes already logged by an existing CMS, eliminating duplicate processing. If source files are available (such as programs), Change Tracker saves and displays source file changes. Source file changes that are restored retain important information such as the date of last change.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW