Change Management & Tracking
What is iSecurity Change Tracker?
iSecurity Change Tracker is dedicated to automatically monitoring and logging object changes made to production libraries at both the source and object levels on the IBM i. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.
Based on the QAUDJRN system journal, iSecurity Change Tracker provides a robust and comprehensive solution for Power Systems including AS/400, iSeries, and System i, that cannot be bypassed. Working in real-time, it can automatically record every revision and collect all information relevant to the modifications made, including object attributes, source code, changes to file structures and more!
- Very rapid implementation enables organizations to install, configure, execute and quickly benefit.
- Full tracking of all change details, including creation, deletion, modifications, etc., ensures total accountability and transparency.
- Instant status report generation adds to auditor's productivity and throughput.
Features of iSecurity Change Tracker
Changes in software libraries can adversely affect company business organizations. With the increasing awareness of industry-wide regulations such as SOX, HIPAA, and PCI, auditing and traceability have become issues of major importance especially within production libraries.
The procedures needed to trace program objects and file changes require a Change Management Systems (CMS), which is often expensive, complex and not feasible for small and mid-sized enterprises to implement. Large organizations often use a CMS to record activities and verify their execution in accordance with corporate policies.
Tracking IBM PTF activity
iSecurity Change Tracker has the capability to track IBM PTF (Program Temporary Fix) applications at the operating system level and PTF related commands. Change Tracker tracks the actual activity that occurs in software product libraries and identifies the license program and PTF ID these changes are related to. Logs and statuses of IBM PTF activity are retained and can be converted into spool file, HTML, PDF, CSV etc. reports.
Real-Time Tracking of Changes
Built-In Report Generator & Scheduler
iSecurityChange Tracker’s unique flexibility in configuration allows you to avoid recording changes already logged by an existing CMS, eliminating duplicate processing. Additonally, if source files are available, iSecurity Change Tracker saves and displays source file changes. Source file changes that are restored retain important information such as the date of last change.
iSecurity Change Tracker gives auditors access to all the data they require, such as who made changes, why, when and from which IP address.