Logo
Sign in
Product Logo
iSecurity VisualizerRaz-Lee

iSecurity Visualizer enhances IBM i auditing with robust features and a user-friendly interface. It allows IT managers to graphically analyze security activities, making investigation and analysis simple, even for non-technical users.

iSecurity-GUI-Visualizer.pdf
DS-GUI-Visualizer.pdf
Product details

iSecurity Visualizer

Enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters. It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge. iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.

Key features

Integrates with every product on the iSecurity Suite

Special functionality has been added to Visualizer to assist in visually analyzing User Profile attributes instantaneously!

  • Visualizer interfaces to iSecurity products such as Audit, Firewall, AP-Journal and FileScope to help in finding the “needle in the haystack” when investigating possible security breaches or other critical system activity.
  • This feature is especially useful to System Administrators and Help Desk personnel in managing and monitoring User Profile passwords, status, authorities and more.

Drilling Down into Log Files

iSecurity Visualizer enhances native IBM i auditing by adding several robust new features, providing a user-friendly interface for working with the large, often confusing number of system values and parameters. It allows IT managers and system administrators to graphically analyze IBM i security related activities instantaneously and without OS/400 technical knowledge. iSecurity Visualizer is an Eclipse-based product which makes security-related investigation and analysis a snap, even for technologically challenged users.

Set up multiple filter criteria

The user simply clicks to select filters and a 3D pie chart, or similar graphics, appears in moments and shows the exact breakdown by the selected criteria.

  • Extract the information you need for cross-correlation data analysis, comparison and investigation
  • Replaces time-consuming and error-prone batch job executions
  • Extract log data fitting your specific needs instantaneously
  • Quickly analyze and monitor important User Profile information such as passwords, disabled/enabled status, User Class, special authorities, etc.