Logo
Sign in
Product Logo
iSecurity AuditRaz-Lee

iSecurity Audit enhances IBM i auditing by monitoring and reporting on all activities in real time. It triggers alerts to potential threats and provides a user-friendly interface for managing system values and parameters. This tool ensures compliance with regulations like SOX, HIPAA, and the California Privacy Act.

DS-Audit.pdf
iSecurity-Audit.pdf
Product details

iSecurity Audit

iSecurity Audit examines events in real time, and triggers alerts and other responsive actions to potential threats. New GUI features providing user-friendly interface for working with the large, often confusing number of system values and parameters. iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file.

Key features

Cutting-edge security

Cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats.

  • Specially designed for non-technical users
  • Enables SOX, HIPAA, and California Privacy Act compliance
  • Simple, intuitive audit parameter definition process
  • Full text explanations of audit types, fields, values, etc
  • Powerful query and report generator
  • Integrates with iSecurity’s Visualizer for BI

Enhanced reporting

Audit offers the most powerful and flexible reporting features available today. It includes more than eighty ready-to-run queries and reports.

  • Query Wizard allows users to quickly and easily create audit reports without programming.
  • Queries employ robust selection criteria such as AND/OR, equal/not equal, greater/less than, like/not like, included in list, etc.
  • Only the information that you really need is included.
  • Report formats are fully customizable

Real Time Detection

The principal feature of Audit is its ability to examine and respond to security related events in real time. When the IBM i (OS/400) current audit settings detect an event, an entry is recorded in the security audit journal. At the same time, Audit looks for a real time detection rule for this event. If such a rule exists, Audit records the event in a history log and optionally triggers an alert message or command script as specified by the rule definition. Action (sold as a separate product) performs these responsive actions. The information also is passed to the SIEMs and it make the LOG records available for BI afterwards.