
iSecurity Audit enhances IBM i auditing by monitoring and reporting on all activities in real time. It triggers alerts to potential threats and provides a user-friendly interface for managing system values and parameters. This tool ensures compliance with regulations like SOX, HIPAA, and the California Privacy Act.
Vendor
Raz-Lee
Company Website
iSecurity Audit
iSecurity Audit examines events in real time, and triggers alerts and other responsive actions to potential threats. New GUI features providing user-friendly interface for working with the large, often confusing number of system values and parameters. iSecurity Audit enhances native IBM i auditing by monitoring and reporting on all activities in the IBM i environment. It employs real-time detection to identify security events as they occur and record details in a log file.
Key features
Cutting-edge security
Cutting-edge security auditing application that examines events in real time, and triggers alerts and other responsive actions to potential threats.
- Specially designed for non-technical users
- Enables SOX, HIPAA, and California Privacy Act compliance
- Simple, intuitive audit parameter definition process
- Full text explanations of audit types, fields, values, etc
- Powerful query and report generator
- Integrates with iSecurity’s Visualizer for BI
Enhanced reporting
Audit offers the most powerful and flexible reporting features available today. It includes more than eighty ready-to-run queries and reports.
- Query Wizard allows users to quickly and easily create audit reports without programming.
- Queries employ robust selection criteria such as AND/OR, equal/not equal, greater/less than, like/not like, included in list, etc.
- Only the information that you really need is included.
- Report formats are fully customizable
Real Time Detection
The principal feature of Audit is its ability to examine and respond to security related events in real time. When the IBM i (OS/400) current audit settings detect an event, an entry is recorded in the security audit journal. At the same time, Audit looks for a real time detection rule for this event. If such a rule exists, Audit records the event in a history log and optionally triggers an alert message or command script as specified by the rule definition. Action (sold as a separate product) performs these responsive actions. The information also is passed to the SIEMs and it make the LOG records available for BI afterwards.