IBM i Audit & Compliance Reporting

iSecurity Audit

iSecurity Audit provides unparalleled monitoring and Audit & Compliance reporting on activity and IBM iSecurity conditions, ensuring compliance with government regulations and industry & corporate standards.

iSecurity Audit provides real-time monitoring of system related activities, generating alerts and initiating responses to potential threats for the IBM i.

iSecurity Audit’s powerful query and report generator provides data required in real-time or scheduled through the built-in scheduling tool. Audit is available in the native “green-screen” interface or a state-of-the-art GUI (Graphical User Interface) version.

iSecurity Audit is for local activity, please see iSecurity Firewall for monitoring remote activity.

image
image

Enables compliance with critical government, industry, and regulatory standards

image

Provides over 200 pre-defined reports covering common IBM i auditing & compliance scenarios

image

Powerful Query Wizard allows users to quickly and easily create audit reports

image

The CMS (Compliance Monitoring System) provides alerts, warnings and corrective actions to threats in real-time

image

iSecurity Visualizer Business Intelligence System available for investigative analysis of IBM i security events.

Features of iSecurity Audit

image

Audit & compliance

iSecurity Audit enhances native IBM i auditing by providing additional features and providing a user-friendly interface. It monitors user and object access in real-time. iSecurity Audit provides over 200 pre-defined reports for auditing & compliance reporting. It works with static security data such as defined user profiles, along with the dynamic actual real time activity of QAUDJRN.

Built-in Real-Time Alerting & Actions

iSecurity Audit can send real-time alerts & process CL commands based on local activity. If a file is deleted, changed, or moved, Audit can offer a real-time resolution. Alerts can be sent via e-mail, MSGQ, SMS, Syslog, Twitter, SNMP. Alert messages can be event-specific, including replacement variables, or standard alert messages. Security information can also be sent to Security Information and Event Management (SIEM) systems.

image
image

Query Wizard and Business Intelligence Reporting

Powerful Query Wizard creates queries quickly and easily without programming, making it easy for non-technical users to RUN a query and VIEW results. Queries can be scheduled to run automatically. Built-in business intelligence tool enables managers to graphically analyze or export IBM i security related system activity quickly and easily. Queries may be output as CSV, PDF, SPOOL FILE, HTML or to an OUTFILE, allowing for manual & automated email delivery.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW