Logo
/
Sign in
Product Logo
iSecurity AuditRaz-Lee

iSecurity Audit enhances IBM i auditing by monitoring and reporting on all activities in real time. It triggers alerts to potential threats and provides a user-friendly interface for managing system values and parameters. This tool ensures compliance with regulations like SOX, HIPAA, and the California Privacy Act.

Product details

iSecurity Audit

iSecurity Audit examines events in real time, and triggers alerts and other responsive actions to potential threats. New GUI features providing user-friendly interface for working with the large, often confusing number of system values and parameters. iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file.

Key features

Cutting-edge security

Cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats.

  • Specially designed for non-technical users
  • Enables SOX, HIPAA, and California Privacy Act compliance
  • Simple, intuitive audit parameter definition process
  • Full text explanations of audit types, fields, values, etc
  • Powerful query and report generator
  • Integrates with iSecurity’s Visualizer for BI

Enhanced reporting

Audit offers the most powerful and flexible reporting features available today. It includes more than eighty ready-to-run queries and reports.

  • Query Wizard allows users to quickly and easily create audit reports without programming.
  • Queries employ robust selection criteria such as AND/OR, equal/not equal, greater/less than, like/not like, included in list, etc.
  • Only the information that you really need is included.
  • Report formats are fully customizable

Real Time Detection

The principal feature of Audit is its ability to examine and respond to security related events in real time. When the IBM i (OS/400) current audit settings detect an event, an entry is recorded in the security audit journal. At the same time, Audit looks for a real time detection rule for this event. If such a rule exists, Audit records the event in a history log and optionally triggers an alert message or command script as specified by the rule definition. Action (sold as a separate product) performs these responsive actions. The information also is passed to the SIEMs and it make the LOG records available for BI afterwards.

Documents
document-icon

DS-Audit.pdf

document-icon

iSecurity-Audit.pdf

Find more products by segment
EnterpriseB2BView all
Find more products by category
Security SoftwareView all