iSecurity Audit provides unparalleled monitoring and Audit & Compliance reporting on activity and IBM iSecurity conditions, ensuring compliance with government regulations and industry & corporate standards.
iSecurity Audit provides real-time monitoring of system related activities, generating alerts and initiating responses to potential threats for the IBM i.
iSecurity Audit’s powerful query and report generator provides data required in real-time or scheduled through the built-in scheduling tool. Audit is available in the native “green-screen” interface or a state-of-the-art GUI (Graphical User Interface) version.
iSecurity Audit is for local activity, please see iSecurity Firewall for monitoring remote activity.
Enables compliance with critical government, industry, and regulatory standards
Provides over 200 pre-defined reports covering common IBM i auditing & compliance scenarios
Powerful Query Wizard allows users to quickly and easily create audit reports
The CMS (Compliance Monitoring System) provides alerts, warnings and corrective actions to threats in real-time
iSecurity Visualizer Business Intelligence System available for investigative analysis of IBM i security events.
iSecurity Audit enhances native IBM i auditing by providing additional features and providing a user-friendly interface. It monitors user and object access in real-time. iSecurity Audit provides over 200 pre-defined reports for auditing & compliance reporting. It works with static security data such as defined user profiles, along with the dynamic actual real time activity of QAUDJRN.
iSecurity Audit can send real-time alerts & process CL commands based on local activity. If a file is deleted, changed, or moved, Audit can offer a real-time resolution. Alerts can be sent via e-mail, MSGQ, SMS, Syslog, Twitter, SNMP. Alert messages can be event-specific, including replacement variables, or standard alert messages. Security information can also be sent to Security Information and Event Management (SIEM) systems.
Powerful Query Wizard creates queries quickly and easily without programming, making it easy for non-technical users to RUN a query and VIEW results. Queries can be scheduled to run automatically. Built-in business intelligence tool enables managers to graphically analyze or export IBM i security related system activity quickly and easily. Queries may be output as CSV, PDF, SPOOL FILE, HTML or to an OUTFILE, allowing for manual & automated email delivery.