Change Management & Tracking

What is iSecurity Change Tracker?

iSecurity Change Tracker is dedicated to automatically monitoring and logging object changes made to production libraries at both the source and object levels on the IBM i. Since Change Tracker relies solely on the actual updates within a library, no manual intervention is required.

Based on the QAUDJRN system journal, iSecurity Change Tracker provides a robust and comprehensive solution for Power Systems including AS400, iSeries, and System i, that cannot be bypassed. Working in real-time, it can automatically record every revision and collect all information relevant to the modifications made, including object attributes, source code, changes to file structures and more!

  • Very rapid implementation enables organizations to install, configure, execute and quickly benefit.
  • Full tracking of all change details, including creation, deletion, modifications, etc., ensures total accountability and transparency.
  • Instant status report generation adds to auditor's productivity and throughput.

Features of iSecurity Change Tracker

Changes in software libraries can adversely affect company business organizations. With the increasing awareness of industry-wide regulations such as SOX, HIPAA, and PCI, auditing and traceability have become issues of vital importance, especially within production libraries.

The procedures needed to trace program objects and file changes require a Change Management Systems (CMS), which is often expensive, complicated and not feasible for small and mid-sized enterprises to implement. Large organizations often use a CMS to record activities and verify their execution follows corporate policies.

Show All Hide All
  • Tracking IBM PTF activity

    iSecurity Change Tracker can track IBM PTF (Program Temporary Fix) applications at the operating system level and PTF related commands. Change Tracker tracks the actual activity that occurs in software product libraries and identifies the license program and PTF ID these changes are connected to. Logs and statuses of IBM PTF activity are retained and can be converted into spool file, HTML, PDF, CSV, etc. reports.

  • Real-Time Tracking of Changes

    iSecurity Change Tracker collects information in real-time, directly from the QAUDJRN, for all changes made to pre-defined libraries.

    Change Management & Tracking - Real-Time Tracking of Changes

  • Built-In Report Generator & Scheduler

    Built-in, field-proven report generator and scheduler include a set of queries tailored to specific auditing needs. Reports can be printed or saved as an HTML, PDF or Excel file which can be e-mailed.

    Change Management & Tracking - Built-In Report Generator & Scheduler

  • Flexible Configuration

    iSecurity Change Tracker’s unique flexibility in configuration allows you to avoid recording changes already logged by an existing CMS, eliminating duplicate processing. Additionally, if source files are available, iSecurity Change Tracker saves and displays source file changes. Source file changes that are restored retain essential information such as the date of last change.

    Change Management & Tracking - Flexible Configuration

  • Auditor Reporting

    iSecurity Change Tracker gives auditors access to all the data they require, such as who made changes, why, when and from which IP address.